搜索
sans
磁力链接/BT种子名称
sans
磁力链接/BT种子简介
种子哈希:
881634223f658c6843142ec33d1121f802d667f1
文件大小:
134.35G
已经下载:
3936
次
下载速度:
极快
收录时间:
2021-04-05
最近下载:
2024-11-13
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:881634223F658C6843142EC33D1121F802D667F1
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
毛利人
秀色大亨
ai白领
745
sw-098
学妹车震
赵总寻花刚下海
海天盛筵+
harry s morgan
not mom
风骚空姐
vikings s04 psa
長 ol
mxsps-469
短发青春大奶美眉 模特身材 因为太高除了前
虚拟淫语体臭责
三原ほのか
極楽
黑丝合集
국물
jk 萝莉 91
+linn+karter
国产暴力
露奶+诱惑
vixen.16.06.28
好尖
생리녀
ママン
+三月最新3p+商场男厕被李雅三秒搞射那个土豪雇佣俩个夜店猛男把她干到翻白眼
ghkp-71
文件列表
SEC506 - Securing Linux-Unix/video/2011/Day 3 - Hardening Unix-Linux Systems Part 3/Part 4 - SyslogNG.mp4
920.9 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/1. Advanced Digital Forensics, Incident Response, & Threat Hunting/1. Introduction to Advanced Incident Response & Threat Hunting.mkv
916.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/010-720.webm
819.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Part 3 - DNS- BIND.mp4
786.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/3. Quick Win Forensics/5. Dead Box Acquisition.mkv
762.1 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Part 6 - Apache.mp4
721.8 MB
SEC506 - Securing Linux-Unix/video/2011/Day 2 - Hardening Unix-Linux Systems Part 2/Part 2 - AIDE.mp4
697.5 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/1. Evidence File Quick Wins and Scene Management/4. Scene Management Evidence Acquisition.mkv
689.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 3 - Hardening Unix-Linux Systems Part 3/Part 1 - SSH Trips and Tricks - Automated Logins.mp4
673.5 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Part 4 - Boot Services.mp4
665.9 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/2. Intrusion Analysis/2. Advanced Evidence of Execution.mkv
645.5 MB
SEC506 - Securing Linux-Unix/video/2011/Day 2 - Hardening Unix-Linux Systems Part 2/Part 3 - Physical- user account and Password Access Control.mp4
630.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Part 2 - SE Linux.mp4
629.0 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/5. Apple Acquisition Internet of Things and Online Attribution/3. MacOS Device Acquisition.mkv
621.3 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Part 1 - Application Security - Chroot.mp4
585.2 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.3.1.mkv
569.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Part 2 - Memory Attacks and Overflows.mp4
563.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Part 3 - Evidence Collection and Preservation.mp4
562.6 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/4. Non-Traditional and Cloud Acquisition/2. Battlefield Forensics with KAPE.mkv
531.1 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Part 1 - Intro to forensics.mp4
528.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/4. Non-Traditional and Cloud Acquisition/4. Remote Acquisition.mkv
528.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/59.mp4
518.3 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/3. Memory Forensics in Incident Response & Threat Hunting/5. Introduction to Memory Analysis.mkv
517.4 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Part 2 - Forensic Preparation and Incident Handling.mp4
516.3 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Part 5 - Sendmail.mp4
511.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Part 5 - SSH.mp4
490.5 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.2.1.mkv
481.5 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.4.1.mkv
463.1 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/2. Intrusion Analysis/3. Event Log Analysis for Responders and Hunters.mkv
456.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/1. Evidence File Quick Wins and Scene Management/3. Understanding the Data.mkv
454.3 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/4. Timeline Analysis/2. Filesystem and Memory Timeline Creation and Analysis.mkv
441.3 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/3. Memory Forensics in Incident Response & Threat Hunting/6. Code Injection Rootkits and Extraction.mkv
437.6 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.1.2.mkv
432.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/5. Apple Acquisition Internet of Things and Online Attribution/4. Internet of Things - IoT.mkv
422.8 MB
SEC506 - Securing Linux-Unix/video/2011/Day 2 - Hardening Unix-Linux Systems Part 2/Part 4 - sudo.mp4
421.7 MB
SEC506 - Securing Linux-Unix/video/2011/Day 2 - Hardening Unix-Linux Systems Part 2/Part 5 - Best Practices for Kernel Tuning and Warning Banners.mp4
408.8 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 2/507 Day 2 Lab 2 - Network Response.mp4
406.5 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/2. Portable Devices and Evidence Acquisition/3. Acquisition Hardware & Software.mkv
392.2 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/2. Intrusion Analysis/1. Credential Theft.mkv
383.5 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Part 3 - OS Install and Patching.mp4
383.0 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 2/507 Day 2 Lab 3 Part 1 - Configuration Analysis.mp4
377.5 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/19.mp4
369.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/1. Evidence File Quick Wins and Scene Management/5. Device Interface Identification.mkv
365.0 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/4. Non-Traditional and Cloud Acquisition/1. File Systems Revisited.mkv
360.1 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.4 - Exploiting Linux for Penetration Testers/4.1 Introduction to Memory.mkv
358.8 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.4 - Exploiting Linux for Penetration Testers/4.4 Advanced Stack Smashing.mkv
356.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 3 - Hardening Unix-Linux Systems Part 3/Part 2 - Unix Logging.mp4
353.1 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.5.2.mkv
352.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/3. Software Security Testing/6.mp4
348.9 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/15.mp4
336.7 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.5.1.mkv
335.6 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/4. Timeline Analysis/6. Super Timeline Analysis.mkv
333.2 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/1. Purple Team Tactics & Kill Chain Defense/2. Adversary Emulation & Purple Team.mkv
332.0 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.3.2.mkv
325.9 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/1. Advanced Digital Forensics, Incident Response, & Threat Hunting/2. Malware-ology.mkv
323.2 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/2. Payload Delivery & Execution/2. Hindering Payload Delivery.mkv
320.1 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/4. Non-Traditional and Cloud Acquisition/3. MultiDrive Storage.mkv
319.5 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Part 6 - Host Based Firewalls - iptables.mp4
312.8 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/3. Exploitation Persistence and Command Control/1. Protecting Applications from Exploitation.mkv
306.4 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 4/Day 4 Lab 4.mp4
297.7 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 4/Day 4 Lab 6.mp4
295.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/2. Portable Devices and Evidence Acquisition/1. Portable Device Acquisition.mkv
292.4 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.2.2.mkv
288.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand.webm
284.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 6/6.1 CAPTURE THE FLAG/SEC542- SANS OnDemand_3_2.webm
284.4 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/1. Advanced Digital Forensics, Incident Response, & Threat Hunting/5. Incident Response & Hunting Across the Enterprise.mkv
277.6 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/video/2011/1.mp4
276.6 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/1. Evidence File Quick Wins and Scene Management/2. Intro to Digital Forensic Acquisition.mkv
276.4 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/43.mp4
274.7 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.1.1.mkv
269.6 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/1. Advanced Digital Forensics, Incident Response, & Threat Hunting/6. Investigating WMI Attacks.mkv
263.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Part 4 - DNSSec.mp4
263.0 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/2. Intrusion Analysis/4. Lateral Movement Adversary Tactics.mkv
253.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.10.mp4
252.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 3 - Hardening Unix-Linux Systems Part 3/Part 3 - SSH Tips and Tricks - X11 and TCP Forwarding.mp4
251.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/24. Exercise Android App Static Analysis.mp4
246.8 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 2/507 Day 2 Lab 6 - Network Population Management.mp4
245.1 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.4 - Exploiting Linux for Penetration Testers/4.3 Smashing the Stack.mkv
233.3 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.2 - Crypto and Post-Exploitation/2.1 Crypto For Pen Testers.mkv
233.3 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Part 1 - Hardening Unix-Linux Systems - Introduction.mp4
229.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.10.mp4
227.5 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 4/Day 4 Lab 1.mp4
227.2 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/8. Data Stream Carving/8.mp4
225.2 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/1. Purple Team Tactics & Kill Chain Defense/1. Course Outline and Lab Setup.mkv
224.4 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.5 - Exploiting Windows for Penetration Testers/5.4 Defeating Hardware DEP with ROP.mkv
220.0 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 5/Day 5 Lab 1.mp4
218.8 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 4/Day 4 Lab 2.mp4
217.8 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/video/2011/4.mp4
217.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/42.mp4
216.9 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 2/507 Day 2 Lab 3 Part 2 - Manual Validation.mp4
206.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/2. Portable Devices and Evidence Acquisition/4. Acquisition Methodology.mkv
206.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.1 Introduction Network Security Essentials/1.webm
202.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/037-720.webm
201.0 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/3. Memory Forensics in Incident Response & Threat Hunting/2. Triage and EDR.mkv
198.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/032-720.webm
193.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.1 Introduction Windows Security/3.webm
193.5 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.1 - WIFI DATA COLLECTION AND ANALYSIS/1.2 SNIFFING WIFI.mkv
189.7 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.6 - CAPTURE THE FLAG/6.1 CAPTURE THE FLAG EVENT.mkv
189.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/17. Exercise Mobile Application Network Traffic Analysis.mp4
188.0 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 5/Day 5 Lab 1b Part 2.mp4
186.0 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/1. File & Stream Recovery.mkv
186.0 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/2. Payload Delivery & Execution/3. Preventing Payload Execution.mkv
185.0 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.1 - Network Attacks for Penetration Testers/1.1 Accessing the Network.mkv
183.7 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/2. Intrusion Analysis/5. Command Line, PowerShell, and WMI Analysis.mkv
178.5 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.4.2.mkv
177.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/3. Quick Win Forensics/1. Memory Acquisition Encryption Checking.mkv
176.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/26.webm
176.2 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/5. Action on Objective Threat Hunting Incident Response/4. Threat Hunting & Incident Response.mkv
174.8 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 4/Day 4 Lab 3.mov
173.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/28. Exercise Android Malware Analysis.mp4
172.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/85.webm
172.2 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 1/507 Day 1 Lab 1 - Calculating Samples.mp4
171.5 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.1.3.mkv
171.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/16. Exercise MobSF.mp4
170.9 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/4. Timeline Analysis/3. Introducing the Super Timeline.mkv
169.8 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/4. Lateral Movement/1. Protecting Administrative Access.mkv
166.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.12.mp4
165.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/24.mp4
165.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/48.mp4
164.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/024-720.webm
163.3 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 1/507 Day 1 Lab 3 - Homework.mp4
163.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/11. Exercise Manipulating Android Intents.mp4
162.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/029-720.webm
162.0 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 3/Day 3 Lab 5.mov
160.7 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 2/507 Day 2 Lab 1 - Layer 2 Traffic.mov
160.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/5. Apple Acquisition Internet of Things and Online Attribution/1. Identifying Online Asset Ownership.mkv
160.6 MB
SEC503 - Network Intrusion Detection/text/2015/503.5.pdf
156.0 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 2/507 Day 2 Lab 5 - DNS and SMTP.mp4
155.3 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/1. Advanced Digital Forensics, Incident Response, & Threat Hunting/3. ATT&CK and Cyber Kill Chain.mkv
155.3 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 2/507 Day 2 Lab 3 Part 3 - Automated Firewall Validation.mp4
154.6 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 1/507 Day 1 Lab 2 - ESXi.mov
154.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.11.mp4
154.0 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/1. Advanced Digital Forensics, Incident Response, & Threat Hunting/4. Malware Persistence.mkv
153.1 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/5. Incident Response & Hunting Across the Enterprise/6. Intrusion Forensic Challenge.mkv
151.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/20. Exercise Modifying Android Applications.mp4
151.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/30.mp4
151.3 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.1 - Network Attacks for Penetration Testers/1.2 Manipulating the Network.mkv
150.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/16.webm
150.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.20.mp4
149.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.10.mp4
148.8 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/text/2016/580.2 - Metasploit Kung Fu for Enterprise Pen Testing Day 2.pdf
148.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/50.mp4
148.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/027-720.webm
148.1 MB
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/text/2011/day1.pdf
147.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/006-720.webm
147.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/28. Exercise Obfuscated Android App Analysis.mp4
146.0 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.3 - Python, Scapy, and Fuzzing/3.2 Python for Non-Python Coders.mkv
145.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.13.mp4
144.9 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.2 - Crypto and Post-Exploitation/2.3 Powershell Essentials for Pen Testers.mkv
144.5 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/5. Action on Objective Threat Hunting Incident Response/2. Data Exfiltration.mkv
144.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/5.mp4
143.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/33. Exercise PhoneGap App Analysis.mp4
143.5 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 4/Day 4 Lab 7.mp4
142.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/2. Portable Devices and Evidence Acquisition/2. Portable Device Analysis.mkv
141.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/024-720.webm
140.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/043-720.webm
140.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/21.mp4
139.8 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/3. Quick Win Forensics/3. Triage Acquisition.mkv
139.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/1.mp4
139.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.47.mp4
137.6 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/4. Lateral Movement/2. Key Attack Strategies Against AD.mkv
135.6 MB
SEC579 - Virtualization and Software-Defined Security/text/2016/SEC579 - Workbook.pdf
135.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/3.mp4
135.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/14. Exercise Manipulating WEb Browser Activity.mp4
135.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/005-720_Debugging_Packed_Malware.webm
134.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/030-720.webm
133.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/21. Exercise Evil Bank.mp4
131.9 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.4 - BLUETOOTH AND SOFTWARE DEFINED RADIO ATTACKS/4.3 PRACTICAL APPLICATION OF SOFTWARE DEFINED RADIO.mkv
131.7 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.2 - WIFI ATTACH AND EXPLOITATION TECHNIQUES/2.2 WIFI CLIENT ATTACKS.mkv
131.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/12. Lab 42 Motivation Factors.mp4
131.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/36. Exercise iPhone Data Analysis.mp4
130.7 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.4 - BLUETOOTH AND SOFTWARE DEFINED RADIO ATTACKS/4.2 BLUETOOTH LOW ENERGY INTRODUCTION AND ATTACK TECHNIQUES.mkv
129.2 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/text/2016/580.1 - Metasploit Kung Fu for Enterprise Pen Testing Day 1.pdf
129.2 MB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/010-720.webm
129.2 MB
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/text/2011/day3.pdf
128.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/3. Quick Win Forensics/4. Host Based Live Acquisition.mkv
128.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/18. Lab 43 Employee Interactions.mp4
128.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/018-720.webm
127.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/019-720.webm
126.7 MB
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/text/2011/day4.pdf
126.3 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.5 - Exploiting Windows for Penetration Testers/5.3 Windows Overflows.mkv
125.5 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 3/Day 3 Lab 4.mov
125.1 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/3. Collecting User Information/7.mp4
125.1 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/5. Incident Response & Hunting Across the Enterprise/2. Cyber Threat Intelligence and Indicators.mkv
125.0 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/5. Incident Response & Hunting Across the Enterprise/3. Evidence of Historical Data.mkv
124.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_19.webm
124.6 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.4 - BLUETOOTH AND SOFTWARE DEFINED RADIO ATTACKS/4.1 BLUETOOTH INTRODUCTION AND ATTACK TECHNIQUES.mkv
124.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.12.mp4
123.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/32.mp4
123.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/024-720.webm
122.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/003-720_Analyzing_Multi-Technology_Malware.webm
122.3 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 3/Day 3 Lab 1.mov
122.3 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.1 - WIFI DATA COLLECTION AND ANALYSIS/1.1 THE WIRELESS THREAT.mkv
122.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/29. Exercise Meterpreter RAT Deployment.mp4
122.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/3. Data Carving Rebuilding.mkv
122.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/6.webm
120.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/9.mp4
119.4 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/4. Timeline Analysis/1. Timeline Analysis Overview.mkv
118.4 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/video/2011/3.mp4
118.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/023-720_Analyzing_Multi-Technology_Malware.webm
117.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.24.mp4
117.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/020-720.webm
116.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/45.mp4
115.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.17.mp4
114.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.7.mp4
114.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_22.webm
113.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_12_2.webm
113.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/004-720.webm
112.1 MB
SEC503 - Network Intrusion Detection/text/2015/503.4.pdf
111.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/003-720_Using_Debuggers_for_Dumping.webm
111.4 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/42.mp4
111.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/21. Lab Debrief.mp4
110.8 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/5. Apple Acquisition Internet of Things and Online Attribution/2. MacOS Device Preparation.mkv
109.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/024-720.webm
109.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/024-720 (1).webm
109.6 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/5. Action on Objective Threat Hunting Incident Response/3. Leveraging Threat Intelligence.mkv
109.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.3-Bypass Flaws/SEC542- SANS OnDemand_5.webm
109.2 MB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/006-720.webm
109.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/22. Exercise Android Backup Analysis.mp4
109.0 MB
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/text/2011/day2.pdf
108.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/74. Maturity Comparison.mp4
108.4 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/15.mp4
108.3 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/016-720.webm
108.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/17. Exercise ADB Access.mp4
107.7 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.5 - Exploiting Windows for Penetration Testers/5.2 Windows OS Protections and Compile-Time Controls.mkv
107.0 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.5 - Exploiting Windows for Penetration Testers/5.1 Introduction to Windows Exploitation.mkv
106.7 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.1 - Network Attacks for Penetration Testers/1.4 IPv6 for Penetration Testers.mkv
105.7 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/5. Action on Objective Threat Hunting Incident Response/1. Domain Dominance.mkv
105.3 MB
SEC503 - Network Intrusion Detection/text/2015/503.3.pdf
103.4 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/6.mp4
102.0 MB
SEC503 - Network Intrusion Detection/text/2015/503.2.pdf
101.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/16. AllInOne Android Root Tools.mp4
101.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/26.mp4
101.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/3. Physical Analyzer Workspace Areas.mp4
100.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/007-720.webm
100.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/73.webm
100.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/019-720.webm
100.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/008-720.webm
99.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/008-720 (1).webm
99.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/003-720.webm
99.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.103.mp4
97.6 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.1 - Network Attacks for Penetration Testers/1.5 Exploiting the Network.mkv
97.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/14.webm
96.9 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Reference Policy.ogv
96.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.13.mp4
96.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/24. Lab 51.mp4
96.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/38.mp4
96.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_10.webm
96.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/14. Lab 2 3 Innovation.mp4
96.1 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555 Workbook.pdf
96.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/7.mp4
95.8 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.5 - RFID, SMART CARDS AND NFC HACKING/5.3 LOW-FREQUENCY RFID ATTACKS.mkv
95.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/92.webm
95.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/61.webm
95.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/23.mp4
95.6 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.2 - WIFI ATTACH AND EXPLOITATION TECHNIQUES/2.1 EXPLOITING WIFI HOTSPOTS.mkv
95.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/031-720.webm
94.9 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/002-720.webm
94.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/44. Lab 3 1 P olicy in Your Organization.mp4
94.4 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/3. Memory Forensics in Incident Response & Threat Hunting/1. Introduction to Memory Forensics in Incident Response and Threat Hunting.mkv
93.8 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Policy Creation.ogv
92.9 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Part 7 - Hardening Unix-Linux Systems.mp4
92.5 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.5 - RFID, SMART CARDS AND NFC HACKING/5.4 EXPLOITING RFID CONTACTLESS SMART CARDS.mkv
92.5 MB
SEC503 - Network Intrusion Detection/text/2015/503.1.pdf
92.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/14. Exercise Android IPC.mp4
91.8 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 2/507 Day 2 Lab 4 - Wireless Clients.mp4
91.7 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.2 - WIFI ATTACH AND EXPLOITATION TECHNIQUES/2.4 DENIAL-OF-SERVICE ATTACKS.mkv
91.6 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.3 - ENTERPRISE WIFI, DECT AND ZIGBEE ATTACKS/3.1 ATTACKING WPA2 PRE-SHARED KEY NETWORKS.mkv
91.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/021-720.webm
91.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.10.mp4
90.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/6.mp4
90.8 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.3.3.mkv
90.3 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 4/Day 4 Lab 5.mp4
90.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/16.mp4
89.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/044-720.webm
88.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_17.webm
88.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/93.webm
87.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_12.webm
87.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/10.mp4
87.0 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/001-720.webm
86.9 MB
SEC530 - Defensible Security Architecture and Engineering/video/2019/530.2.3.mkv
86.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/009-720.webm
86.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/009-720.webm
86.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/011-720.webm
85.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/011-720.webm
85.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/13. Frida and Objection.mp4
85.9 MB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/001-720.webm
85.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/009-720.webm
85.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/90.webm
85.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/28. Lab 33.mp4
84.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/26.webm
84.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/33. Lab 44 Performance Coaching.mp4
84.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/74.webm
84.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/23. Lab 43 A.mp4
84.1 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 4/Day 4 Lab 0.mp4
83.9 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/1. Welcome to Windows Forensic Analysis For500/4.mp4
83.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/26.mp4
83.1 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.3 - Python, Scapy, and Fuzzing/3.3 Leveraging Scapy.mkv
82.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.7.mp4
82.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.7 Port Pivot Relay/SEC560 - 3.7.7.mp4
82.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_12_2.webm
82.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.10.mp4
82.1 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/4. Where Do We Go from Here.mkv
82.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/4.mp4
81.1 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.3 - Python, Scapy, and Fuzzing/3.1 Product Security Testing.mkv
81.0 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/2. Portable Devices and Evidence Acquisition/5. Discovering Interacting with Data.mkv
81.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/7.mp4
80.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/35.mp4
80.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.1 Introduction Cryptography and Risk Management/3.webm
80.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/015-720.webm
79.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/6.webm
79.6 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/6.mp4
79.5 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/26.mp4
79.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/046-720.webm
79.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_9.webm
79.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/10. File Carving/7.mp4
78.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/13. Lab 53.mp4
78.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/015-720.webm
78.2 MB
FOR500 - Windows Forensic Analysis/text/2017/500.Workbook.pdf
78.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/33.webm
78.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/008-720.webm
78.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/21. Lab 54.mp4
77.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/13. Lab 21A.mp4
77.5 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.6 - Capture the Flag/6.2 Capture the Flag. Solution.mkv
77.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/032_526/005-720.webm
77.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.19.mp4
77.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/22. SSL Kill Switch 2.mp4
76.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.36.mp4
76.7 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.1 - Network Attacks for Penetration Testers/1.6 Bootcamp.mkv
76.4 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 3/Day 3 Lab 3.mov
76.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/30.mp4
76.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/49.mp4
75.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/17.mp4
75.4 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.3 - Python, Scapy, and Fuzzing/3.5 Building a Fuzzing Grammar with Sulley.mkv
75.2 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.1 - WIFI DATA COLLECTION AND ANALYSIS/1.4 BRIDGING THE AIRGAP.mkv
75.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/88.webm
75.2 MB
SEC579 - Virtualization and Software-Defined Security/text/2016/SEC579.6 - Auditing and Compliance for Virtualization and Cloud.pdf
74.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand_9.webm
74.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.5-Command Injection/SEC542- SANS OnDemand_7.webm
74.6 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/2.mp4
74.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/011-720.webm
73.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_24.webm
73.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/87.webm
73.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.13.mp4
72.9 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/video/2011/2.mp4
72.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/7. Android AVD Manager.mp4
72.5 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/3. Exploitation Persistence and Command Control/2. Avoiding Installation.mkv
72.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/29. Exercise Banking Transaction Manipulation.mp4
72.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/16. Lab 32.mp4
71.8 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/5.mp4
71.7 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/009-720.webm
71.2 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/2. Payload Delivery & Execution/1. Common Delivery Mechanisms.mkv
71.0 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.3 - ENTERPRISE WIFI, DECT AND ZIGBEE ATTACKS/3.4 ATTACKING ZIGBEE DEPLOYMENTS.mkv
70.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/006-720.webm
70.5 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/1. Welcome to Windows Forensic Analysis For500/2.mp4
70.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/23.webm
70.5 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/text/2019/599.3 - Exploitation, Persistence, and Command & Control.pdf
70.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/009-720.webm
70.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.3 BloodHound/SEC560 - 5.3.6.mp4
70.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/15. Any Questions.mp4
70.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/19.mp4
70.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/22.mp4
69.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/005-720.webm
69.9 MB
SEC579 - Virtualization and Software-Defined Security/text/2016/SEC579.5 - Virtualization and Cloud Integration Policy Operations and Compliance.pdf
69.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/70.mp4
69.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/033-720.webm
69.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/2. Registry Forensic Analysis/3.mp4
69.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/24.mp4
69.1 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.3 - ENTERPRISE WIFI, DECT AND ZIGBEE ATTACKS/3.2 ATTACKING WPA2-ENTERPRISE NETWORKS.mkv
69.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.19.mp4
68.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/026-720.webm
68.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/013-720.webm
68.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/23.mp4
68.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/005-720.webm
68.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/005-720.webm
68.4 MB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/015-720.webm
68.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/12. Lab 44.mp4
68.1 MB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/020-720.webm
68.0 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/20.mp4
67.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_18.webm
67.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.16.mp4
67.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/5.mp4
67.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/23.mp4
67.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/019-720.webm
67.1 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/text/2019/599.2 - Payload Delivery and Execution.pdf
67.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.1 Introduction Network Security Essentials/3.webm
66.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/20.mp4
66.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/7.webm
66.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.4 WPScan/SEC542- SANS OnDemand_5_2.webm
66.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_16.webm
66.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/17. Lab 31 A.mp4
65.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/33.mp4
65.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/14.mp4
65.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/041-720.webm
65.1 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/4. Lateral Movement/3. How Can We Detect Lateral Movement.mkv
65.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.22.mp4
64.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/57.webm
63.8 MB
FOR500 - Windows Forensic Analysis/text/2017/500.5.pdf
63.6 MB
FOR578 - Cyber Threat Intelligence/text/2018/578.Workbook.pdf
63.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/011-720.webm
63.5 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/text/2019/599.1 - Purple Team Tactics & Kill Chain Defenses.pdf
63.4 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.4 Baselining and User Behavior Monitoring.pdf
63.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/8.mp4
63.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/17.webm
62.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/66.webm
62.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/22.webm
62.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/19.mp4
62.4 MB
FOR500 - Windows Forensic Analysis/text/2017/500.3-4.pdf
62.2 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.1 SIEM Architecture and SOF-ELK.pdf
62.2 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.1 - WIFI DATA COLLECTION AND ANALYSIS/1.3 ROGUE AP ANALYSIS.mkv
62.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/064-720.webm
61.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/010-720.webm
61.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_12.webm
61.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/8. Data Stream Carving/1.mp4
61.1 MB
SEC579 - Virtualization and Software-Defined Security/text/2016/SEC579.2 - Virtualization and Private Cloud Infrastructure Security.pdf
61.1 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2019/572-W.pdf
61.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/017-720_Analyzing_Multi-Technology_Malware.webm
60.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.5 ANALYZING SPIDERING RESULTS/SEC542- SANS OnDemand_7.webm
60.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_16_2.webm
60.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.12.mp4
60.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/015-720.webm
60.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/14.webm
60.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_18.webm
60.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.24.mp4
60.1 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.4 - Exploiting Linux for Penetration Testers/4.2 Introduction to Shellcode.mkv
60.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/30.webm
59.9 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/13.mp4
59.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/9.mp4
59.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/1.mp4
59.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/19.mp4
59.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.31.mp4
59.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/2. Change Patch and Vulnerability Management/4.mp4
59.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/22. Lab 41.mp4
59.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/91.webm
59.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 2 - Hardening Unix-Linux Systems Part 2/Part 6 - Hardening unix-Linux Systems-parttwo Summary.mp4
58.9 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/text/2019/599.5 - Action on Objectives, Threat Hunting, & Incident Response.pdf
58.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 6/6.1 CAPTURE THE FLAG/SEC542- SANS OnDemand_2_2.webm
58.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 2 - Hardening Unix-Linux Systems Part 2/Extra/Linux -etc-sysctl.conf -- continued.ogv
58.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/2. Private Key Security Best Practices/3.mp4
58.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/16.mp4
58.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.1 Introduction Threat Management/3.webm
58.2 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.3 Advanced Endpoint Analytics.pdf
58.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/3. Core Windows Forensics Focus on Analysis/1.mp4
57.8 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/5.mp4
57.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/021-720.webm
57.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.1 Introduction Defense-in-Depth and Attacks/3.webm
57.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/8.mp4
57.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/30. Lab 31 B.mp4
57.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/011-720.webm
57.1 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/text/2019/599.4 - Lateral Movement.pdf
57.1 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/2. Registry Forensic Analysis/5.mp4
57.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/2.mp4
56.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/14.mp4
56.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_18.webm
56.7 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/video/2011/5.mp4
56.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/4.mp4
56.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/009-720.webm
56.5 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.3 - Python, Scapy, and Fuzzing/3.6 Fuzzing Block Coverage Measurement.mkv
56.5 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/8.mp4
56.4 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.5 - RFID, SMART CARDS AND NFC HACKING/5.5 ATTACKING NFC.mkv
56.4 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.5 Tactical SIEM Detection and Post-Mortem Analysis.pdf
56.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/041-720.webm
56.3 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.2 Service Profiling with SIEM.pdf
55.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/030-720.webm
55.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/86.webm
55.7 MB
SEC460 - Enterprise Threat and Vulnerability Assessment/text/2018/SEC460.2 - Discovery.pdf
55.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/2.mp4
55.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/18.mp4
55.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/77.webm
55.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/33.mp4
55.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/4.webm
55.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/16.webm
55.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/048-720.webm
54.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/044-720.webm
54.5 MB
FOR500 - Windows Forensic Analysis/video/2018/7. Windows Forensic Challenge/1. The Forensic Challenge HandsOn Case Study/1.mp4
54.4 MB
SEC579 - Virtualization and Software-Defined Security/text/2016/SEC579.1 - Virtualization Security Architecture and Design.pdf
54.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_19.webm
54.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_11_2.webm
53.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/37.mp4
53.9 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 3/Day 3 Lab 2.mov
53.9 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/AUD 507 Workbook.pdf
53.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/40. Zillow Report Card.mp4
53.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/56.mp4
53.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/009-720.webm
53.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_15.webm
52.9 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.3 - Python, Scapy, and Fuzzing/3.4 Fuzzing Introduction and Operation.mkv
52.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/21.mp4
52.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/29.mp4
52.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/33.webm
52.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_24.webm
52.6 MB
FOR500 - Windows Forensic Analysis/text/2017/500.1-2.pdf
52.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/48.mp4
52.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/017-720.webm
52.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/11.mp4
52.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/015-720.webm
52.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/022-720_Code_Injection_API_Hooking.webm
52.0 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/4. Timeline Analysis/4. Targeted Super Timeline Creation.mkv
51.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/024-720.webm
51.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/7.mp4
51.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/6.mp4
51.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/15. Exercise Android Emulation.mp4
51.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/1/1.mp4
51.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/15.mp4
51.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/6. Google Cloud Extractions and Analysis/8. Lab 22 B.mp4
51.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/06.webm
51.0 MB
SEC579 - Virtualization and Software-Defined Security/text/2016/SEC579.3 - Virtualization Offense and Defense Part 1.pdf
50.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/35.mp4
50.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.12 HEART BLEED/SEC542- SANS OnDemand_8_2.webm
50.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/020-720.webm
50.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/007-720_Code_Injection_API_Hooking.webm
50.3 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.2 - Crypto and Post-Exploitation/2.2 Escaping Restricted Desktops.mkv
50.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/5.mp4
50.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/005-720.webm
49.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/005-720 (1).webm
49.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/25.webm
49.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/022-720.webm
49.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/12. Lab 22 A.mp4
49.8 MB
SEC460 - Enterprise Threat and Vulnerability Assessment/text/2018/SEC460.3 - Enhanced Vulnerability Scanning and Automation.pdf
49.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/3.mp4
49.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/22.webm
49.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/11.mp4
49.5 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/3. Internet Browser Forensics/2.mp4
49.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/9.mp4
49.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/41. Lab 24 Summary Audit Dockers Security.mp4
49.3 MB
SEC579 - Virtualization and Software-Defined Security/text/2016/SEC579.4 - Virtualization Offense and Defense Part 2.pdf
49.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/66.webm
49.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/1.mp4
49.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/008-720.webm
49.0 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2019/SEC617 - Workbook.pdf
48.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/015-720.webm
48.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/8.webm
48.6 MB
SEC460 - Enterprise Threat and Vulnerability Assessment/text/2018/SEC460.1 - Methodology, Planning, and Threat Modeling.pdf
48.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/013-720.webm
48.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/014-720.webm
48.2 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/31.mp4
48.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/37.mp4
48.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand_10_2.webm
47.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/26.mp4
47.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/25.webm
47.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/27. Lab 44 Summary Serverless Security.mp4
47.6 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/3. Exploitation Persistence and Command Control/3. Foiling Command & Control.mkv
47.6 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2019/760.1 - Exploit Mitigations and Reversing with IDA.pdf
47.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/9.mp4
47.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/2.mp4
47.4 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.2 - WIFI ATTACH AND EXPLOITATION TECHNIQUES/2.5 WIFI FUZZING FOR BUG DISCOVERY.mkv
47.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/11. Foncy Short Code Delivery.mp4
47.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/60.webm
47.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/2.mp4
46.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/95.webm
46.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/94.webm
46.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/014-720.webm
46.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.12.mp4
46.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/038-720.webm
46.7 MB
FOR585 - Advanced Smartphone Forensics/text/2020/585.Workbook.pdf
46.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.7.mp4
46.7 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2019/760.5 - Advanced Windows Exploitation.pdf
46.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/32.mp4
46.5 MB
ICS410 - ICS SCADA Security Essentials/text/2018/410-2 Field Devices and Controllers.pdf
46.5 MB
FOR585 - Advanced Smartphone Forensics/text/2020/585.4.pdf
46.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/46.webm
46.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/54.webm
46.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/65.webm
46.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/37. Lab 12 Summary PreCommit Security.mp4
46.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/21.mp4
46.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/011-720.webm
46.0 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.3 - ENTERPRISE WIFI, DECT AND ZIGBEE ATTACKS/3.3 ATTACKING DIGITAL ENHANCED CORDLESS TELEPHONY DEPLOYMENTS.mkv
45.9 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/SELinux Problem.ogv
45.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/25. Lab 21B.mp4
45.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/17.webm
45.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/71.mp4
45.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/006-720.webm
45.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/1.mp4
45.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/4.mp4
45.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/13.mp4
45.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/7.mp4
45.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/72. Industry Comparison Approach.mp4
45.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/2.mp4
45.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/01.webm
45.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/2.webm
44.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/019-720.webm
44.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/45.mp4
44.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/2/2.mp4
44.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_28.webm
44.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.52.mp4
44.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/69.webm
44.3 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.4 - Exploiting Linux for Penetration Testers/4.5 Bootcamp.mkv
44.2 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.1 - Network Attacks for Penetration Testers/1.3 Routing Attacks.mkv
44.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/16.webm
44.0 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.5 - RFID, SMART CARDS AND NFC HACKING/5.1 RFID INTRODUCTION.mkv
44.0 MB
SEC561 - Immersive Hands-on Hacking Techniques/text/2015/SEC561.pdf
44.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/012-720.webm
43.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/4.mp4
43.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/1.mp4
43.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/035-720_Analyzing_Multi-Technology_Malware.webm
43.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/022-720.webm
43.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/014-720.webm
43.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Setting Contexts.ogv
43.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/022-720.webm
43.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/02.webm
43.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/075-720.webm
43.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/006-720.webm
43.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/006-720 (1).webm
43.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/29. Lab 23 Summary Manage Configuration with Puppet.mp4
43.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.54.mp4
43.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/05.webm
43.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/029-720.webm
42.9 MB
SEC460 - Enterprise Threat and Vulnerability Assessment/text/2018/SEC460.5 - Collaboration, Remediation and Reporting.pdf
42.8 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/video/2019/617.2 - WIFI ATTACH AND EXPLOITATION TECHNIQUES/2.3 ATTACKING WEP.mkv
42.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/18.mp4
42.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/10.mp4
42.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/9.mp4
42.5 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/1. Evidence File Quick Wins and Scene Management/1. SIFT Introduction.mkv
42.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/10.mp4
42.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/016-720.webm
42.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_20.webm
42.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/65.webm
42.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/030-720.webm
42.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/5. AXIOM Fundamentals/7. AXIOM Key Features 2.mp4
42.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/029-720_Analyzing_Multi-Technology_Malware.webm
42.0 MB
SEC503 - Network Intrusion Detection/video/2018/0.1 Course Intro/008-720.webm
41.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/0. Getting Started With SANS OnDemand/0.1 Welcome to Your SANS OnDemand Course/SEC560 - 0.1.1.webm
41.9 MB
SEC460 - Enterprise Threat and Vulnerability Assessment/text/2018/SEC460.4 - Vulnerability Validation, Triage, and Data Management.pdf
41.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/3.webm
41.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/2.webm
41.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/012-720_Code_Injection_API_Hooking.webm
41.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/026-720.webm
41.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/20.mp4
41.7 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Part 7 - Application Security Summary.mp4
41.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/001_526_OnDemand/008-720.webm
41.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Devices Illustrated.ogv
41.5 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/3. Quick Win Forensics/2. Mounting Evidence.mkv
41.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/66.mp4
41.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/58.webm
41.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/16.mp4
41.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2019/560.Workbook.pdf
41.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/2.mp4
41.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/40.mp4
41.0 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/10. File Carving/1.mp4
40.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.6.mp4
40.8 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/8.mp4
40.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.2.mp4
40.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.1 Introduction Linux Security Essentials/3.webm
40.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.8 SUMMARY/SEC542- SANS OnDemand_2_2.webm
40.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/1. Classify Information and Supporting Assets/2.mp4
40.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_9.webm
40.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.13.mp4
40.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/26.mp4
40.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/002-720 (1).webm
40.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/23.mp4
40.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/037-720.webm
40.3 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.2 - Crypto and Post-Exploitation/2.4 Escape and Escalation.mkv
40.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/13.mp4
40.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/027-720.webm
40.3 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.5 - Exploiting Windows for Penetration Testers/5.7 Bootcamp.mkv
40.3 MB
FOR578 - Cyber Threat Intelligence/text/2018/578.1.pdf
40.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/018-720.webm
39.9 MB
ICS410 - ICS SCADA Security Essentials/text/2018/410-3 Supervisory Systems.pdf
39.9 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.4.pdf
39.8 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/4. Timeline Analysis/5. Filtering the Super Timeline.mkv
39.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/13. Androsim Example.mp4
39.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/41.webm
39.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/3. Flow Control Conditional Testing and Loops/4.mp4
39.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/008-720.webm
39.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/008-720.webm
39.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/8. Android Backups/7. Lab 14.mp4
39.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/24.webm
39.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/10.mp4
39.4 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2019/508.2.pdf
39.3 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/Day 5/Day 5 Lab 1b Part 1.mp4
39.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/10.mp4
39.2 MB
MGT517 - Managing Security Operations Detection, Response, and Intelligence/text/2018/Day1.pdf
39.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/2.mp4
39.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/42.webm
39.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/29.webm
38.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/008-720.webm
38.8 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/3. Memory Forensics in Incident Response & Threat Hunting/3. Memory Forensics.mkv
38.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/6. Smartphone Forensic Capstone Exercise/1. Smartphone Forensic Capstone Exercise/4. Good Luck.mp4
38.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/2.mp4
38.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/011-720.webm
38.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/006-720.webm
38.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/13.mp4
38.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/015-720_Analyzing_Multi-Technology_Malware.webm
38.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_2.webm
38.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/008-720.webm
38.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/2.webm
38.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/13.mp4
37.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/1. Introduction to Smartphone Overview Fundamentals of Analysis SQLite/3. Lab 0.mp4
37.8 MB
ICS410 - ICS SCADA Security Essentials/text/2018/410-1 ICS Overview.pdf
37.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.15.mp4
37.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/4.mp4
37.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/36.mp4
37.4 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/video/2013/507 Lab Introduction.mp4
37.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/21.mp4
37.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/18.webm
37.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/032_526/004-720.webm
37.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/1. Background/3. Course Roadmap.mp4
37.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/1.mp4
37.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/12.mp4
37.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/005-720.webm
37.2 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/020-720.webm
37.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/15.webm
37.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/18.webm
37.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/32.mp4
36.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/08.webm
36.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/25.mp4
36.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/12. Lab 10 Summary AWS Account Configuration.mp4
36.8 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/39.mp4
36.7 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.4.pdf
36.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/18.mp4
36.7 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.2.pdf
36.6 MB
FOR578 - Cyber Threat Intelligence/text/2018/578.2.pdf
36.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/2.webm
36.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/18. Android PIN Brute Force.mp4
36.5 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/9.mp4
36.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/03.webm
36.4 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/24.mp4
36.2 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2019/760.2 - Advanced Linux Exploitation.pdf
36.2 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2019/760.4 - Windows Kernel Debugging and Exploitation.pdf
36.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/56.webm
36.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/019-720.webm
36.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.1 Introduction to Comprehensive Pen Test Planning, Scoping, and Recon/SEC560 - 1.1.5.mp4
36.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/2.webm
35.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/012-720.webm
35.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/015-720.webm
35.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/1.webm
35.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/7. Android Interesting Files.mp4
35.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/4. Active Directory Permissions and Delegation of Authority for Damage Containment/5.mp4
35.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/4. Active Directory Permissions and Delegation of Authority for Damage Containment/2.mp4
35.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/027-720.webm
35.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.1 Introduction to Comprehensive Pen Test Planning, Scoping, and Recon/SEC560 - 1.1.1.mp4
35.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.3 COURSE LOGISTICS/SEC542- SANS OnDemand_4.webm
35.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/8.mp4
35.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/015-720.webm
35.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/015-720 (1).webm
35.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/43.mp4
35.4 MB
SEC545 - Cloud Security Architecture and Operations/text/2020/545.Workbook.pdf
35.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/11.mp4
35.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/26.mp4
35.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/11.webm
35.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/27. Lab 51 Summary Blocking Attacks with WAF.mp4
35.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/22.mp4
35.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/28.mp4
35.0 MB
FOR578 - Cyber Threat Intelligence/text/2018/578.3.pdf
34.9 MB
ICS410 - ICS SCADA Security Essentials/text/2018/410-4 Workstations and Servers.pdf
34.9 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2019/508.4-5.pdf
34.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_21.webm
34.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/015-720.webm
34.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_02.webm
34.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/20.mp4
34.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/035-720.webm
34.6 MB
SEC530 - Defensible Security Architecture and Engineering/text/2019/530.Workbook.pdf
34.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.1 INTRODUCTION TO AUTOMATED DEFENSE, FORENSICS AND OFFENSE/05.webm
34.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/81.webm
34.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_13.webm
34.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.8.mp4
34.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/19.webm
34.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/005-720.webm
34.4 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.1.pdf
34.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/22.mp4
34.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/76.webm
34.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/01.webm
34.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/002-720.webm
34.2 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2019/760.3 - Patch Diffing, One-Day Exploits, and Return-Oriented Shellcode.pdf
34.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/020-720.webm
34.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/020-720 (1).webm
34.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.10.mp4
34.2 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/8.mp4
34.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/32.webm
34.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/73. Spending Comparison.mp4
34.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/5.mp4
34.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/008-720.webm
34.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/6.mp4
34.0 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2019/508.3.pdf
33.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/10.mp4
33.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/12.mp4
33.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_2.webm
33.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_14.webm
33.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/013-720.webm
33.8 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.5.pdf
33.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/15.mp4
33.7 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.6 - Capture the Flag/6.1 Capture the Flag.mkv
33.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/75.webm
33.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/41. Lab 33 Policy Planning.mp4
33.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Config 4 Bastion.ogv
33.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/2.mp4
33.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.13.mp4
33.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.1 Intro Fundamental of traffic analysis I/001-720.webm
33.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.2 TESTING SOFTWARE CONFIGURATION/SEC542- SANS OnDemand_8_2.webm
33.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/12.mp4
33.5 MB
SEC506 - Securing Linux-Unix/video/2011/Day 2 - Hardening Unix-Linux Systems Part 2/Extra/Using Adore.ogv
33.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/013-720.webm
33.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_14.webm
33.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/037-720.webm
33.3 MB
MGT517 - Managing Security Operations Detection, Response, and Intelligence/text/2018/Day3.pdf
33.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/24. Lab 52.mp4
33.2 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.3.pdf
33.2 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/9.mp4
33.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/019-720.webm
33.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/031-720_Analyzing_Multi-Technology_Malware.webm
33.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/26. Lab 33 Summary Monitor with Dashboards.mp4
33.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/1.webm
33.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/19. Ideal Configuration for Jailbreak.mp4
33.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/2. Security Evaluation Models/6.mp4
33.0 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.5.pdf
33.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/23. Adding a Second JOIN Statement to the Query.mp4
32.9 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.1.pdf
32.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/019-720_Malware_Memory_Forensics.webm
32.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/24.webm
32.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.7 Port Pivot Relay/SEC560 - 3.7.3.mp4
32.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/56. Core Values Worksheet 1.mp4
32.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/24.mp4
32.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/text/2018/526.3.pdf
32.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/008-720.webm
32.6 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.3.pdf
32.4 MB
MGT517 - Managing Security Operations Detection, Response, and Intelligence/text/2018/Day2.pdf
32.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/32.webm
32.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/07.webm
32.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/035-720.webm
32.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/45. Lab 43 Summary Using API Gateway.mp4
32.1 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2019/508.1.pdf
32.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2019/514.5.pdf
32.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/barlog audit.ogv
32.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/18.mp4
32.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/17. Lab 13.mp4
31.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/011-720.webm
31.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/003-720.webm
31.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/44. Lab 31 Summary CloudFormation Security Review.mp4
31.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/37. Lab 43 B.mp4
31.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/015-720_Malware_Memory_Forensics.webm
31.4 MB
SEC524 - Cloud Security Fundamentals/text/2012/524.2.pdf
31.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/022-720.webm
31.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/009-720_Getting_Started_with_Unpacking.webm
31.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.37.mp4
31.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/57. Lab 22 Summary CloudFormation Automation.mp4
31.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/54. Lockheed Martin Case Study.mp4
31.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/021-720.webm
31.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Generating Keys.ogv
31.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/6.mp4
31.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/015-720.webm
31.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_17.webm
31.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.10 BURP INTRUDER/SEC542- SANS OnDemand_8.webm
31.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/5.mp4
31.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/18.mp4
31.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/27. Lab 52 Summary CloudMapper Continuous Audit.mp4
31.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/010-720.webm
30.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/20.mp4
30.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/3.mp4
30.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/037-720.webm
30.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/5.mp4
30.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/008-720.webm
30.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/79.webm
30.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/054-720.webm
30.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/11. Lab 11.mp4
30.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/10. Lab 41 Leadership and You.mp4
30.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/2. Private Key Security Best Practices/2.mp4
30.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/1.mp4
30.7 MB
MGT517 - Managing Security Operations Detection, Response, and Intelligence/text/2018/Day4.pdf
30.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/text/2018/526.1.pdf
30.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/68.webm
30.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/1.webm
30.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/018-720.webm
30.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/10.mp4
30.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand_6.webm
30.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/4. Lab 11 Summary Deployment Kata.mp4
30.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.11.mp4
30.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/1. Strategic Planning Foundations.mp4
30.4 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/14.mp4
30.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/27.mp4
30.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.1 Intro Fundamental of traffic analysis II/001-720.webm
30.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/11.mp4
30.3 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/007-720.webm
30.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/16.mp4
30.3 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/text/2016/SANS SEC501.5 Malware.pdf
30.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/32.webm
30.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/89.webm
30.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/6.mp4
30.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/61. Lab 13 Summary Automating Static Analysis.mp4
30.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand_4_2.webm
30.1 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.2.pdf
30.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/10.mp4
30.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Extra/Format String Attacks.ogv
30.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/007-720.webm
29.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/32.webm
29.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/02.webm
29.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/10. Dont Miss the BLOBs.mp4
29.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/22. Lab 46 Managing Change.mp4
29.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/20.mp4
29.8 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/45.mp4
29.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/032_526/002-720.webm
29.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.1 Moving Files with Exploits/SEC560 - 4.1.8.mp4
29.7 MB
SEC506 - Securing Linux-Unix/video/2011/Day 3 - Hardening Unix-Linux Systems Part 3/Extra/ssh-agent and scripts.ogv
29.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/-Z flag.ogv
29.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/50.webm
29.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/13.mp4
29.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/12.mp4
29.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/5.mp4
29.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/26.webm
29.3 MB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/8.mp4
29.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/8.mp4
29.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/1/8.mp4
29.3 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/009-720.webm
29.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/32.mp4
29.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/017-720.webm
29.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/6.mp4
29.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/17.mp4
29.2 MB
ICS410 - ICS SCADA Security Essentials/text/2018/410-5 ICS Security Governance.pdf
29.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_5.webm
29.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/007-720.webm
29.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/007-720.webm
29.1 MB
FOR585 - Advanced Smartphone Forensics/text/2020/585.5.pdf
29.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/13.webm
29.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/10.mp4
29.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/22. Lab 45 Strategic Communications.mp4
29.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/23.mp4
29.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/2.webm
29.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/4.mp4
28.9 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/13.mp4
28.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/18. Location Information Google Cloud Artifacts.mp4
28.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/059-720.webm
28.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/07.webm
28.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/36.webm
28.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/015-720.webm
28.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/32.mp4
28.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/11.webm
28.8 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/2. The Donald Blake Case/5.mp4
28.8 MB
FOR578 - Cyber Threat Intelligence/text/2018/578.5.pdf
28.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/17.mp4
28.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/25.webm
28.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.72.mp4
28.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/14.mp4
28.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/38.webm
28.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/054-720.webm
28.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/29.mp4
28.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/008-720.webm
28.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/008-720.webm
28.6 MB
SEC450 - Blue Team Fundamentals. Security Operations and Analysis/text/2019/450.Workbook.pdf
28.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/23.mp4
28.4 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/3. Memory Forensics in Incident Response & Threat Hunting/4. Acquiring Memory.mkv
28.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/52.mp4
28.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/text/2018/526.2.pdf
28.3 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/video/2019/1. Purple Team Tactics & Kill Chain Defense/3. Reconnaissance.mkv
28.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/83.webm
28.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/11.mp4
28.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/006-720.webm
28.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/6.mp4
28.1 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/008-720.webm
28.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/6. Internet of Things and SCADA/6.mp4
28.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/004-720.webm
28.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 2 - Hardening Unix-Linux Systems Part 2/Part 1 - Todays Agenda.mp4
27.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/3.mp4
27.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/019-720.webm
27.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/004-720.webm
27.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/012-720.webm
27.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/20.webm
27.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_2_2.webm
27.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/9.mp4
27.7 MB
SEC506 - Securing Linux-Unix/video/2011/Day 3 - Hardening Unix-Linux Systems Part 3/Extra/Using ssh-keygen.ogv
27.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/04.webm
27.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/018-720.webm
27.7 MB
SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses/text/2019/599.6 - Workbook.pdf
27.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/text/2020/498.Workbook 1-3.pdf
27.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/55.webm
27.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/78.webm
27.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/text/2018/526.4.pdf
27.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_5_2.webm
27.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/25.webm
27.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.3.mp4
27.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/022-720.webm
27.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/012-720_Recognizing_Packed_Malware.webm
27.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/35.webm
27.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/007-720.webm
27.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/007-720.webm
27.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2019/542.Workbook.pdf
27.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/021-720.webm
27.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/006-720.webm
27.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_03.webm
27.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/33.webm
27.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/02.webm
27.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/013-720.webm
27.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/018-720.webm
26.9 MB
MGT517 - Managing Security Operations Detection, Response, and Intelligence/text/2018/Day5.pdf
26.8 MB
SEC524 - Cloud Security Fundamentals/text/2012/524.1.pdf
26.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/013-720.webm
26.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/82.webm
26.7 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/31.mp4
26.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/5.webm
26.7 MB
FOR585 - Advanced Smartphone Forensics/text/2020/585.3.pdf
26.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/9.mp4
26.7 MB
SEC401 - Security Essentials Bootcamp Style/text/2019/401.5_Windows Security.pdf
26.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/019-720.webm
26.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/3.mp4
26.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/14.webm
26.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/012-720.webm
26.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/10. SQLite Behind the Scenes.mp4
26.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/29. Android Security Updates.mp4
26.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/010-720.webm
26.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.12.mp4
26.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/4.webm
26.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/7.mp4
26.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/013-720.webm
25.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/21.webm
25.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/28.webm
25.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/29.webm
25.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/018-720.webm
25.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.35.mp4
25.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/24.mp4
25.7 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.5 - Exploiting Windows for Penetration Testers/5.5 Building a Metasploit Module.mkv
25.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/031-720.webm
25.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/006-720_Getting_Started_with_Unpacking.webm
25.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/024-720.webm
25.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/26.webm
25.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/004-720_Code_Injection_API_Hooking.webm
25.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.10 INTERCEPTION PROXIES/SEC542- SANS OnDemand_7_2.webm
25.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/6.mp4
25.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/4.webm
25.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_17.webm
25.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/46. Gap Analysis Inputs.mp4
25.4 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Extra/Explanation of how an instructor handles exercises.ogv
25.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/5.mp4
25.3 MB
SEC540 - Cloud Security and DevOps Automation/text/2020/540.Workbook.pdf
25.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/40. Lab 12 Intel BYOD Case Overview.mp4
25.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/54.mp4
25.2 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2019/572.4.pdf
25.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.8.mp4
25.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/2. Change Patch and Vulnerability Management/6.mp4
25.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/023-720.webm
25.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/9.mp4
25.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/11.mp4
25.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/07.webm
25.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/008-720.webm
25.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_13.webm
24.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/1.mp4
24.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/1.mp4
24.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/43.webm
24.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/1.mp4
24.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_10.webm
24.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/004-720.webm
24.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/52.webm
24.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/3. Course Roadmap.mp4
24.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/5.mp4
24.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/text/2018/526.5.pdf
24.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/026-720.webm
24.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/026-720 (1).webm
24.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/40.webm
24.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.21.mp4
24.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/012-720.webm
24.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/86.mp4
24.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/15.webm
24.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/013-720.webm
24.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/14.mp4
24.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/5.mp4
24.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/4.mp4
24.3 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.3 - Python, Scapy, and Fuzzing/3.7 Source-Assisted Fuzzing with AFL.mkv
24.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/2.mp4
24.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/034-720.webm
24.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/Running Process Deleted Binary.ogv
24.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/017-720.webm
24.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/03.webm
24.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/8.mp4
24.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_4_2.webm
24.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/19.mp4
24.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/24. Lab 42 Summary CloudFront Content Protection.mp4
24.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/6.mp4
24.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/019-720.webm
23.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/24. Lab 35 Group Discussion.mp4
23.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/7.mp4
23.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/7.mp4
23.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.1 Introduction Linux Security Essentials/2.webm
23.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/26.webm
23.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.18.mp4
23.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_15.webm
23.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.6.mp4
23.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.1/SANS OnDemand1.1.webm
23.8 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.2 - Crypto and Post-Exploitation/2.5 Modern Bypasses & Tools.mkv
23.8 MB
SEC503 - Network Intrusion Detection/text/2015/503.6.pdf
23.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/39. Lab 34 Summary Secrets Management.mp4
23.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/11.mp4
23.8 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.3 - Python, Scapy, and Fuzzing/3.8 Bootcamp.mkv
23.7 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/egrep.ogv
23.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.10.mp4
23.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/004-720.webm
23.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/03.webm
23.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/2.mp4
23.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/8.mp4
23.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/53.webm
23.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/4. Smart Token Multifactor Authentication/5.mp4
23.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/12.mp4
23.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/008-720.webm
23.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/017-720.webm
23.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/15.mp4
23.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/25.mp4
23.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/37.mp4
23.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/13.mp4
23.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/13. Launch Unc0ver.mp4
23.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/34.mp4
23.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.4 WEB APPLICATION PEN TESTER'S TOOLKIT/SEC542- SANS OnDemand_6.webm
23.3 MB
FOR585 - Advanced Smartphone Forensics/text/2020/585.1.pdf
23.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/022-720.webm
23.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/10. Example Attempting to Root During Acquisition.mp4
23.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/23. Locating Lost Devices.mp4
23.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/3.mp4
23.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/016-720.webm
23.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/019-720.webm
23.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/11.webm
23.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/4.mp4
23.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/58. Lab 24 Roadmap Development.mp4
23.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/1/5.mp4
23.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/35. Course Roadmap 3.mp4
23.0 MB
FOR578 - Cyber Threat Intelligence/text/2018/578.4.pdf
23.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/15.mp4
23.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/59.webm
22.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/07.webm
22.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_7.webm
22.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/19.webm
22.8 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2019/572.2.pdf
22.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/11. Interacting with AVDs.mp4
22.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/15.webm
22.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/72.webm
22.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.1 WHY THE WEB/SEC542- SANS OnDemand_8.webm
22.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/007-720.webm
22.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/43.webm
22.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/8.mp4
22.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/4. Active Directory Permissions and Delegation of Authority for Damage Containment/7.mp4
22.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/15.mp4
22.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/1.webm
22.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/08.webm
22.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/3. RAT Capabilities.mp4
22.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/08.webm
22.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/39.mp4
22.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.52.mp4
22.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/007-720.webm
22.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/1.webm
22.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/021-720.webm
22.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/3.mp4
22.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/030-720.webm
22.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/005-720_Getting_Started_with_Unpacking.webm
22.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_11.webm
22.2 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2019/572.5.pdf
22.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/010-720.webm
22.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/016-720.webm
22.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/3. Course Roadmap.mp4
22.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.4.mp4
22.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/1.mp4
21.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/12.webm
21.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/010-720.webm
21.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/22.webm
21.9 MB
FOR585 - Advanced Smartphone Forensics/text/2020/585.2.pdf
21.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.6.mp4
21.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/011-720.webm
21.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/70.webm
21.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/7.mp4
21.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.40.mp4
21.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/30.webm
21.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/4. Lab 54 Environment Tear Down/2. Lab 54 Environment Tear Down.mp4
21.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/71.webm
21.7 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/getsebool-a.ogv
21.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/009-720.webm
21.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.5.mp4
21.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/4.mp4
21.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/10.mp4
21.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/42.mp4
21.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/63.webm
21.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/011-720.webm
21.5 MB
MGT517 - Managing Security Operations Detection, Response, and Intelligence/text/2018/Workbook.pdf
21.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/006-720.webm
21.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/46.mp4
21.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/36.webm
21.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/28.webm
21.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/55. Case Study Indicators of Compromise.mp4
21.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/21.mp4
21.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/031-720.webm
21.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/29.webm
21.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.21.mp4
21.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.9.mp4
21.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/4.mp4
21.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/35.webm
21.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/030-720.webm
21.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/9. File Metadata/1.mp4
21.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/9.mp4
21.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/7.mp4
21.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/06.webm
21.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/42.webm
21.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/9.webm
21.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/26.webm
21.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/20.webm
21.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/21.mp4
21.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/34.mp4
21.1 MB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/001-720.webm
21.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/2. iPremier Case Overview.mp4
21.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/022-720.webm
21.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/022-720 (1).webm
21.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/019-720.webm
21.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/017-720.webm
21.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/51.webm
20.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/4.mp4
20.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/25. Lab 32 Code Analysis in CodePipeline Summary.mp4
20.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/9.webm
20.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/006-720.webm
20.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/18. Lab 21 Summary AWS and Jenkins Configuration.mp4
20.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/028-720_Analyzing_Multi-Technology_Malware.webm
20.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/4/4.mp4
20.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_2.1.webm
20.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/5.mp4
20.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/26.mp4
20.7 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/video/2019/5. Incident Response & Hunting Across the Enterprise/4. Advanced Execution Recovery.mkv
20.6 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2019/572.1.pdf
20.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/088-720.webm
20.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/21.mp4
20.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/015-720.webm
20.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/013-720.webm
20.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/01.webm
20.4 MB
SEC401 - Security Essentials Bootcamp Style/text/2019/401.6_Linux Security.pdf
20.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/77. Lab 34 Group Discussion.mp4
20.4 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/7. Advanced Acquisition/4.mp4
20.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/006-720.webm
20.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/10.mp4
20.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/2.mp4
20.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/11.mp4
20.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/19.mp4
20.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/38. Jashopper Read the Case.mp4
20.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/007-720.webm
20.2 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/003-720.webm
20.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/13.mp4
20.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/11.mp4
20.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/4.mp4
20.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/003-720.webm
20.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/33.mp4
20.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/88. Lab 14 Summary Automating Dynamic Analysis.mp4
20.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/12.mp4
20.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.2 DOCUMENT OBJECT MODEL/SEC542- SANS OnDemand_3_3.webm
20.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/2.webm
20.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_15.webm
20.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.13.mp4
20.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/014-720.webm
20.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_14.webm
20.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/10.mp4
20.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/40.webm
20.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/003-720.webm
20.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/07.webm
20.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/2.webm
19.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.19.mp4
19.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/13. Imported Code.mp4
19.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/3. Android File System Structures/3. Physical Acquisition Data Obtained.mp4
19.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/13.webm
19.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/18. Fitbit Case Scenario.mp4
19.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/5.webm
19.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/017-720.webm
19.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/5.mp4
19.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/8.mp4
19.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/6.webm
19.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/text/2019/575.Workbook.pdf
19.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/16.mp4
19.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/9.mp4
19.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/2.webm
19.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/23.mp4
19.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/021-720_Code_Injection_API_Hooking.webm
19.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/017-720_Code_Injection_API_Hooking.webm
19.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/017-720.webm
19.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.7.mp4
19.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/3.mp4
19.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/006-720.webm
19.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/013-720.webm
19.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/005-720.webm
19.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_17.webm
19.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/006-720.webm
19.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/17.mp4
19.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/8. Data Stream Carving/6.mp4
19.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/2.webm
19.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.1 Why Exploitation/SEC560 - 3.1.3.mp4
19.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/2. Security Evaluation Models/3.mp4
19.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/15.webm
19.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/4.mp4
19.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/005-720_Code_Injection_API_Hooking.webm
19.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/018-720.webm
19.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/098-720.webm
19.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/13.mp4
19.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/012-720.webm
19.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/5.mp4
19.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/21.webm
19.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/10.mp4
19.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/004-720.webm
19.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/3. Flow Control Conditional Testing and Loops/6.mp4
19.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/1. Welcome to Windows Forensic Analysis For500/3.mp4
19.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/14.webm
19.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/008-720.webm
19.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/10.webm
19.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/65. Course Roadmap 4.mp4
19.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/20. Frida.mp4
19.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/74. Lab 14 Solution Fill in the Strategy Map 1.mp4
19.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/040-720.webm
19.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/007-720.webm
18.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/17.webm
18.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/1.webm
18.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/22.mp4
18.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/49.webm
18.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/2.mp4
18.9 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/1. Core Windows Forensics II USB Devices and Shell Items Introduction/4.mp4
18.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/019-720.webm
18.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/008-720.webm
18.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_17.webm
18.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/31. Lab 53 Summary Cloud Custodian Remediation.mp4
18.8 MB
SEC401 - Security Essentials Bootcamp Style/text/2019/401.3_Threat Management.pdf
18.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/20.mp4
18.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/106.mp4
18.7 MB
SEC401 - Security Essentials Bootcamp Style/text/2019/401.1_Network Security.pdf
18.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/3.mp4
18.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/26.mp4
18.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/05.webm
18.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/13. Course Roadmap 3.mp4
18.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/32.webm
18.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/15.mp4
18.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/1. Background/2. Strategic Planning Process.mp4
18.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_06.webm
18.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/5. AXIOM Fundamentals/2. Magnet AXIOM Overview.mp4
18.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/12.mp4
18.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/1. Course Roadmap 1.mp4
18.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/18.mp4
18.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/14.mp4
18.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/04.webm
18.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/26.webm
18.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_13_2.webm
18.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/3. Flow Control Conditional Testing and Loops/3.mp4
18.5 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/10.mp4
18.5 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/14.mp4
18.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/016-720.webm
18.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/039-720_Analyzing_Multi-Technology_Malware.webm
18.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/074-720.webm
18.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/12.mp4
18.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/002-720.webm
18.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2019/504.1.pdf
18.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/004-720.webm
18.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/5.webm
18.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/14.webm
18.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/5.mp4
18.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.23.mp4
18.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/45.webm
18.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/8.webm
18.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/018-720.webm
18.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/018-720 (1).webm
18.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/03.webm
18.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.3.mp4
18.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/016-720.webm
18.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/07.webm
17.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/29.webm
17.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/3.mp4
17.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/2. Why Security Must Decipher the Business.mp4
17.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/67. Lab 1 5 Defense Identification.mp4
17.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.3 PROCESS EXECUTION/02.webm
17.9 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/5. Edge Overview/7.mp4
17.9 MB
SEC511 - Continuous Monitoring and Security Operations/text/2019/511.Workbook.pdf
17.9 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/7. Advanced Acquisition/1.mp4
17.9 MB
SEC201 - Computing & Technology Essentials/text/2017/SEC201_3_C01_01.pptx
17.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/003-720.webm
17.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/35.mp4
17.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/14.mp4
17.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_07.webm
17.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/10.webm
17.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/005-720.webm
17.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/19.mp4
17.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.1 Why Exploitation/SEC560 - 3.1.2.mp4
17.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/003-720.webm
17.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/2. The Donald Blake Case/1.mp4
17.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/034-720.webm
17.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/17.mp4
17.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/9.mp4
17.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.79.mp4
17.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/11.mp4
17.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.8.mp4
17.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/04.webm
17.5 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/2.mp4
17.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/62.webm
17.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/003-720.webm
17.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/2. Strategic Planning Process.mp4
17.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/4/5.mp4
17.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/024-720.webm
17.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/017-720.webm
17.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/15.webm
17.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_3.webm
17.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/013-720.webm
17.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/18.webm
17.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/20.webm
17.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/3. Core Windows Forensics Focus on Analysis/3.mp4
17.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/043-720.webm
17.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/1.mp4
17.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/005-720.webm
17.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/51.mp4
17.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_04.webm
17.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.1 WHY THE WEB/SEC542- SANS OnDemand_3.webm
17.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/02.webm
17.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/1. Introduction to DevSecOps.mp4
17.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/058-720.webm
17.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/015-720.webm
17.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/015-720.webm
17.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/9.mp4
17.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/67.webm
17.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/36.mp4
17.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/42.webm
17.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.29.mp4
17.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/011-720.webm
17.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.26.mp4
16.9 MB
SEC401 - Security Essentials Bootcamp Style/text/2019/401.4_Cryptography and Risk Management.pdf
16.9 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/21.mp4
16.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/016-720.webm
16.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/4.webm
16.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.2.mp4
16.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/10.mp4
16.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/4.mp4
16.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/01.webm
16.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.1 INTRODUCTION TO ESSENTIAL SKILLS WORKSHOP/08.webm
16.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/10.mp4
16.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/003-720.webm
16.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/4. Active Directory Permissions and Delegation of Authority for Damage Containment/4.mp4
16.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/14. Android Forensic Acquisition.mp4
16.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/3. Collecting User Information/1.mp4
16.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/002-720.webm
16.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/002-720 (1).webm
16.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.14.mp4
16.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/13.mp4
16.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/06_2.webm
16.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/7. Strategic Planning Process.mp4
16.7 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Signing Zone Files.ogv
16.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/26.mp4
16.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/25.mp4
16.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/1. Security Assessment Strategies/2.mp4
16.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/02.webm
16.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/016-720.webm
16.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/004-720.webm
16.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.38.mp4
16.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/46. Equifax PEST Example.mp4
16.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/30.webm
16.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/3. iOS File System Structures/7. Encrypted vs Not Encrypted iOS 13 File System Extraction.mp4
16.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.1/003-720.webm
16.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/20.mp4
16.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/53. Presentation Storyboard.mp4
16.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/010-720.webm
16.5 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2019/572.3.pdf
16.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/10.mp4
16.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2018/610.3.pdf
16.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.2.mp4
16.5 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/1.mp4
16.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/48. Lab 22 SWOT Exercise 1.mp4
16.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/32.mp4
16.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/08.webm
16.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/006-720.webm
16.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/05.webm
16.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/47.webm
16.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/014-720.webm
16.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/7.mp4
16.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/05.webm
16.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/14.mp4
16.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.22.mp4
16.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/09.webm
16.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/50.mp4
16.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/21.webm
16.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/11.mp4
16.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/9.webm
16.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_5.webm
16.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/74. Course Roadmap 5.mp4
16.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/74.mp4
16.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/14.webm
16.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/1.mp4
16.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/17.webm
16.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/27. General or Specific and Why.mp4
16.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/25.mp4
16.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/42.webm
16.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.21.mp4
16.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_3.webm
16.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/006-720.webm
16.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/019-720_Code_Injection_API_Hooking.webm
16.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/008-720.webm
15.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/5.mp4
15.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/3.webm
15.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/041-720.webm
15.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/008-720_Malware_Memory_Forensics.webm
15.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/36.webm
15.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/018-720_Code_Injection_API_Hooking.webm
15.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/19.mp4
15.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/25. iLEAPP A Free Parser.mp4
15.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/012-720_Malware_Memory_Forensics.webm
15.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/2. Mobile Problems and Opportunities.mp4
15.8 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Neg cache TTL.ogv
15.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/15. iOS Updates.mp4
15.8 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/13.mp4
15.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/009-720_Malware_Memory_Forensics.webm
15.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/4. Smart Token Multifactor Authentication/4.mp4
15.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/010-720.webm
15.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/32.webm
15.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/18. NET and Strings.mp4
15.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/006-720.webm
15.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/4.mp4
15.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.10.mp4
15.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/4. Smart Token Multifactor Authentication/2.mp4
15.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/45.webm
15.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/19.mp4
15.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/12.webm
15.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/23.mp4
15.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/12.mp4
15.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/4. ARP Spoofing.mp4
15.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/2.mp4
15.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_5_2.webm
15.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/3.mp4
15.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_02.webm
15.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/24.webm
15.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/62. Bundling Versus Unbundling.mp4
15.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/27. Framework Subcategory Examples.mp4
15.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/26. JWT Security Best Practices.mp4
15.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/014-720.webm
15.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/44.webm
15.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/12.mp4
15.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/10.webm
15.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/1.webm
15.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/24.webm
15.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2019/560.1.pdf
15.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/013-720.webm
15.4 MB
FOR498 - Battlefield Forensics and Data Acquisition/text/2020/498.Workbook 4-6.pdf
15.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/26. Other Transaction Manipulation Opportunities.mp4
15.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/5. Edge Overview/1.mp4
15.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.3 PROCESS EXECUTION/03.webm
15.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.11.mp4
15.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/020-720.webm
15.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2019/504.Workbook.pdf
15.3 MB
SEC503 - Network Intrusion Detection/video/2018/4.1 Intro Network monitoring - snort and bro/001-720.webm
15.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/32.webm
15.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/57. Update Policy to Address Current Risks.mp4
15.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.46.mp4
15.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/31. Unpacking Decompiling and Performing Static Analysis.mp4
15.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/011-720.webm
15.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.5 Bootcamp - researching protocols/008-720.webm
15.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/22.mp4
15.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/023-720_Malware_Memory_Forensics.webm
15.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/2.webm
15.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/18.mp4
15.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/79.mp4
15.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.1 Why Exploitation/SEC560 - 3.1.7.mp4
15.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/25.mp4
15.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/01.webm
15.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/18.webm
15.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/26.mp4
15.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/20.webm
15.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/052-720.webm
15.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/96.webm
15.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/2. Data Storage and Filesystems.mp4
15.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/18.mp4
15.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/15.mp4
15.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/019-720.webm
15.1 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.2 - Crypto and Post-Exploitation/2.6 Bootcamp.mkv
15.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/9.mp4
15.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/004-720.webm
15.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/64.webm
15.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/2.mp4
15.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/84.webm
15.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/21.webm
15.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/15.webm
15.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/001-720.webm
15.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.4.mp4
15.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/5.mp4
15.0 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/6.mp4
15.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/018-720.webm
15.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.12.mp4
15.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/3.mp4
15.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/1.webm
15.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.2 LOGIC ATTACKS/SEC542- SANS OnDemand_3.webm
15.0 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.WB.pdf
15.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/016-720.webm
15.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/016-720.webm
15.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/13.mp4
14.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/22. Lab 35 Cloud Computing Policy.mp4
14.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/009-720.webm
14.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/25.webm
14.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.5 Bootcamp - researching protocols/001-720.webm
14.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/03.webm
14.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/10.mp4
14.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/2.mp4
14.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/30.webm
14.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/12.webm
14.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/12.mp4
14.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/36. Course Roadmap 3.mp4
14.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/8.mp4
14.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/35.webm
14.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.17.mp4
14.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/025-720.webm
14.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/018-720.webm
14.7 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/2.mp4
14.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/11.webm
14.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/9.mp4
14.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/2. Strategic Planning Process.mp4
14.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/25.webm
14.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/24. APOLLO.mp4
14.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/3. How to Develop an Understanding of the Threats.mp4
14.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.6.mp4
14.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/8.mp4
14.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.30.mp4
14.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/023-720.webm
14.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/07.webm
14.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/2. Android Fundamental Components.mp4
14.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/16.mp4
14.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/7.mp4
14.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.7.mp4
14.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_16.webm
14.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/1/4.mp4
14.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2019/504.5.pdf
14.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/006-720.webm
14.6 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/25.mp4
14.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/08.webm
14.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/2. The SIFT Workstation/2. SIFT Forensic Workstation.mp4
14.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/11.webm
14.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/20.mp4
14.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/4.mp4
14.5 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/Using Netcat.ogv
14.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/62.mp4
14.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/023-720.webm
14.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/27.mp4
14.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/9.webm
14.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/9. iOS Snapshots.mp4
14.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/04.webm
14.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/005-720.webm
14.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/04.webm
14.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/11.webm
14.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/27.mp4
14.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/28.mp4
14.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/011_526/005-720.webm
14.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/022-720.webm
14.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2019/504.2.pdf
14.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/48.webm
14.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/10.webm
14.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/020-720.webm
14.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/text/2020/498.3.pdf
14.3 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Extra/The Canonical Question.ogv
14.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/4.mp4
14.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/3.mp4
14.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/2. Private Key Security Best Practices/4.mp4
14.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/51.mp4
14.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/17.mp4
14.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/15.mp4
14.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/020-720.webm
14.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/9.mp4
14.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/018-720.webm
14.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/1. Course Roadmap 1.mp4
14.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/2. Mitigating Mobile Malware.mp4
14.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/016-720.webm
14.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/27.mp4
14.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.9.mp4
14.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/59.mp4
14.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/021-720.webm
14.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/021-720 (1).webm
14.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/13.webm
14.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/4.webm
14.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/7.mp4
14.1 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/grep.ogv
14.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/019-720.webm
14.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/1.webm
14.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_06.webm
14.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/3.mp4
14.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/022-720.webm
14.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/019-720.webm
14.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/12.webm
14.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/73. Lab 14 Creating a Strategy Map.mp4
14.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/1.mp4
14.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/11.mp4
14.0 MB
FOR498 - Battlefield Forensics and Data Acquisition/text/2020/498.4.pdf
14.0 MB
SEC401 - Security Essentials Bootcamp Style/text/2019/401.2_Defense in Depth and Attacks.pdf
13.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/31.mp4
13.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/004-720_Recognizing_Packed_Malware.webm
13.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/33. Lab Debrief.mp4
13.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/005-720.webm
13.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_10.webm
13.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_16.webm
13.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.6.mp4
13.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/21.mp4
13.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/009-720.webm
13.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/04.webm
13.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/02.webm
13.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/3. SSL Connection Validation.mp4
13.8 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.5 - Exploiting Windows for Penetration Testers/5.6 Windows Shellcode.mkv
13.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/17.mp4
13.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/3.mp4
13.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_3_3.webm
13.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/003-720.webm
13.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/006-720.webm
13.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.11.mp4
13.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/13.webm
13.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/41. Lab 12 Relationship Management.mp4
13.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/14.mp4
13.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/9.mp4
13.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_6_2.webm
13.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/16.mp4
13.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.85.mp4
13.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/13.mp4
13.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/12.mp4
13.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_18.webm
13.7 MB
SEC530 - Defensible Security Architecture and Engineering/text/2019/530.2.pdf
13.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/12.mp4
13.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/013-720.webm
13.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/09.webm
13.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/05.webm
13.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.5.mp4
13.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_03.webm
13.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/21.mp4
13.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/61. ATTCK Navigator.mp4
13.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_05.webm
13.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/014-720.webm
13.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/2.mp4
13.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/Tricking Script.ogv
13.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/014-720.webm
13.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/3. Monitoring and Metrics in DevOps.mp4
13.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_13.webm
13.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/12.mp4
13.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/19.webm
13.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/3.mp4
13.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/text/2019/487.3.pdf
13.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/76. Lab 34 Vulnerability Management Policy.mp4
13.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/5. Unrestricted Device Warnings.mp4
13.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/029-720.webm
13.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/017-720.webm
13.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/2. What You Need to Know About Android.mp4
13.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/25.mp4
13.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/83.mp4
13.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/017-720.webm
13.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/35.webm
13.4 MB
FOR498 - Battlefield Forensics and Data Acquisition/text/2020/498.6.pdf
13.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.7.mp4
13.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/011-720.webm
13.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/09.webm
13.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/012-720.webm
13.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2019/504.4.pdf
13.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/6.mp4
13.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/08.webm
13.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/3.mp4
13.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/009-720.webm
13.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/002-720_Recognizing_Packed_Malware.webm
13.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/37.mp4
13.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/009-720.webm
13.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/19.webm
13.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/80.mp4
13.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/16.mp4
13.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/9. Putting It All Together/5.mp4
13.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/020-720.webm
13.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/13.mp4
13.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/013-720.webm
13.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/100-720.webm
13.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/04.webm
13.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/47.mp4
13.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/6.mp4
13.2 MB
SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception/text/2016/SANS550 - 2016.pdf
13.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/7.mp4
13.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.24.mp4
13.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/002-720.webm
13.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/025-720.webm
13.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/04.webm
13.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/3.mp4
13.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/37.mp4
13.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.7 Port Pivot Relay/SEC560 - 3.7.6.mp4
13.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/03.webm
13.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/2.webm
13.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/7.mp4
13.1 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Recursive Queries.ogv
13.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/2.mp4
13.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/6.mp4
13.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/09.webm
13.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/11. Cain Graceful Exit.mp4
13.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/06.webm
13.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/13.mp4
13.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/3. Emulators vs Hardware Devices.mp4
13.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/62. Course Roadmap 5.mp4
13.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_15.webm
13.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/20.mp4
13.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/037-720.webm
13.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/05.webm
13.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/022-720.webm
13.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/014-720.webm
13.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2018/610.5.pdf
13.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/3. Course Summary 2.mp4
13.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/34.mp4
13.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/12.mp4
13.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/5.webm
13.0 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/52.mp4
12.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/007-720.webm
12.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.3.mp4
12.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_3.webm
12.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/11.mp4
12.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/2.mp4
12.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/32.webm
12.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/4.mp4
12.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/6. Device Passcodes.mp4
12.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/014-720.webm
12.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/3. Secure Continuous Delivery at Twitter.mp4
12.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/05.webm
12.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/3.mp4
12.8 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/Isof.ogv
12.8 MB
SEC573 - Automating Information Security with Python/text/2020/573.Workbook.pdf
12.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/023-720.webm
12.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/13.mp4
12.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/16.webm
12.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/006-720.webm
12.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/006-720.webm
12.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2018/610.4.pdf
12.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/27.mp4
12.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/08.webm
12.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/12. Multimedia Files EXIF Data.mp4
12.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/008-720.webm
12.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/22.webm
12.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/4.mp4
12.7 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/7. Advanced Acquisition/5.mp4
12.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/6/2.mp4
12.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/19.webm
12.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/31.mp4
12.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/042-720_Analyzing_Multi-Technology_Malware.webm
12.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/002-720.webm
12.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/002-720.webm
12.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/12. Multimedia Files EXIF Data.mp4
12.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/10.webm
12.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/3. Flow Control Conditional Testing and Loops/7.mp4
12.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/012-720.webm
12.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/9.mp4
12.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/008-720.webm
12.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/1.webm
12.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/4.webm
12.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/22.mp4
12.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/11.mp4
12.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/8.mp4
12.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/26.webm
12.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/7.mp4
12.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/090-720.webm
12.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/23.webm
12.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/006-720.webm
12.6 MB
SEC201 - Computing & Technology Essentials/text/2017/SEC201_1_C01_01.pptx
12.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/30.mp4
12.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/3.mp4
12.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/03.webm
12.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/09.webm
12.5 MB
SEC530 - Defensible Security Architecture and Engineering/text/2019/530.1.pdf
12.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/10.mp4
12.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/15.mp4
12.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/14.mp4
12.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/13. Module Summary.mp4
12.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/4. Course Roadmap 2.mp4
12.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/51.mp4
12.5 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/26.mp4
12.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.3.mp4
12.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/027-720.webm
12.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/021-720.webm
12.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/011-720.webm
12.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.4.mp4
12.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/15.webm
12.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/50.mp4
12.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/43.mp4
12.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/1. Course Roadmap 1.mp4
12.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/8.mp4
12.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/2.mp4
12.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/084-720.webm
12.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/4. Background.mp4
12.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.2.mp4
12.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.6.mp4
12.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/21.webm
12.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/17.webm
12.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/012-720.webm
12.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/021-720.webm
12.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/1. Classify Information and Supporting Assets/4.mp4
12.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.7.mp4
12.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_12_2.webm
12.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.3 PROCESS EXECUTION/04.webm
12.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/038-720.webm
12.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/20.mp4
12.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/7. Unique Identifiers within Applications.mp4
12.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/03.webm
12.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.9.mp4
12.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/10.webm
12.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_16.webm
12.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/28.mp4
12.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_9_2.webm
12.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.1 Introduction to Comprehensive Pen Test Planning, Scoping, and Recon/SEC560 - 1.1.6.mp4
12.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/3.mp4
12.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/7.webm
12.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/19.mp4
12.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/23.mp4
12.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/15.webm
12.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/3. OWASP Mobile Application Security Verification Standard.mp4
12.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/32.mp4
12.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/19.mp4
12.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/2.webm
12.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/20.mp4
12.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/text/2020/498.1.pdf
12.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/6. Timing is Everything Where did the Messages Go.mp4
12.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_09.webm
12.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/15.webm
12.2 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/23.mp4
12.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/2.mp4
12.1 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/text/2016/SANS SEC501.1 Defensive Network Infrastructure.pdf
12.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/26.mp4
12.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.5.mp4
12.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/016-720.webm
12.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/035-720.webm
12.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/4.mp4
12.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/6.mp4
12.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/2. PowerShell for Local Users and Groups/4.mp4
12.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/026-720.webm
12.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/017-720.webm
12.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/10.mp4
12.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/21.mp4
12.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/004-720.webm
12.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/004-720.webm
12.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/23. Course Roadmap 3.mp4
12.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/018-720.webm
12.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/25.webm
12.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/5.mp4
12.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_6_2.webm
12.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/030-720_Code_Injection_API_Hooking.webm
12.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.11.mp4
12.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/5.mp4
12.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/002-720.webm
12.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/proc.ogv
12.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/39. Jashopper Group Discussion.mp4
12.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/12.webm
12.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/10.mp4
12.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_4.webm
12.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/41.mp4
12.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/52. Risk Appetite Statement Example 2.mp4
12.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/013-720.webm
12.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.11.mp4
12.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/006-720_Malware_Memory_Forensics.webm
11.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/029-720.webm
11.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/17.webm
11.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/6.webm
11.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/15.mp4
11.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/24.mp4
11.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/18.webm
11.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/026-720.webm
11.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/6.mp4
11.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/1.webm
11.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/2.webm
11.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/02.webm
11.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_05.webm
11.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/018-720.webm
11.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.5.mp4
11.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.3.mp4
11.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/19.mp4
11.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/007-720.webm
11.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/003-720.webm
11.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/5.mp4
11.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/14.mp4
11.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/15.mp4
11.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.4.mp4
11.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/74.mp4
11.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/006-720.webm
11.8 MB
SEC545 - Cloud Security Architecture and Operations/text/2020/545.Labs.pdf
11.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/7. Obfuscated Sources.mp4
11.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/43.webm
11.8 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/3.mp4
11.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/10.mp4
11.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/17.webm
11.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/05.webm
11.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/05.webm
11.8 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/52.mp4
11.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/7.mp4
11.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/010-720.webm
11.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/7.mp4
11.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.2.mp4
11.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/27.webm
11.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/010-720.webm
11.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/29.mp4
11.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/12.mp4
11.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/009-720.webm
11.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_19.webm
11.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/07.webm
11.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/4.mp4
11.7 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/dcat.ogv
11.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/68. Defense Identification Worksheet.mp4
11.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/6. iOS Backup Files 2.mp4
11.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/25.mp4
11.7 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.4.pdf
11.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/17.mp4
11.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/8.mp4
11.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/16.mp4
11.6 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/43.mp4
11.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/043-720.webm
11.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/32.webm
11.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/19.mp4
11.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/16. iPremier Case B Debrief.mp4
11.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/025-720.webm
11.6 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/2.mp4
11.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/1.mp4
11.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/7.webm
11.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/10.webm
11.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/docroot.ogv
11.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.1.mp4
11.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/75. Creating Credibility.mp4
11.6 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/text/2016/SANS SEC501.3 Pentest.pdf
11.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/19. Breaking Changes in iOS.mp4
11.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/11.mp4
11.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/007-720.webm
11.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.8.mp4
11.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/10.webm
11.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/1. Course Roadmap 1.mp4
11.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/024-720.webm
11.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/12.webm
11.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_2.webm
11.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/005-720.webm
11.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/text/2019/487.Workbook.pdf
11.5 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/text/2016/SANS SEC501.4 First Responder.pdf
11.5 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/073-720.webm
11.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/012-720.webm
11.5 MB
SEC450 - Blue Team Fundamentals. Security Operations and Analysis/text/2019/450.2.pdf
11.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/012-720.webm
11.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/09.webm
11.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/003-720.webm
11.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/007-720.webm
11.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/23.webm
11.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/006-720.webm
11.4 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/text/2016/SANS SEC501.2 Packet Analysis.pdf
11.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/022-720.webm
11.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/008-720.webm
11.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/24. Need for a Security Framework.mp4
11.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/024-720.webm
11.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/16. Datetime Comparison of Key Plists.mp4
11.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/5. Course Roadmap 2.mp4
11.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2019/504.3.pdf
11.4 MB
FOR498 - Battlefield Forensics and Data Acquisition/text/2020/498.5.pdf
11.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/16.mp4
11.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/023-720.webm
11.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/023-720 (1).webm
11.4 MB
SEC530 - Defensible Security Architecture and Engineering/text/2019/530.3.pdf
11.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/019-720.webm
11.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/022-720_Malware_Memory_Forensics.webm
11.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/010-720.webm
11.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/028-720.webm
11.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.10.mp4
11.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/009-720.webm
11.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/03.webm
11.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/13. Lab 32 Positive Voicing.mp4
11.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/24.mp4
11.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/13.webm
11.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_08.webm
11.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/02.webm
11.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/7.mp4
11.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/23.webm
11.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/014-720.webm
11.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/064-720.webm
11.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/12.mp4
11.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/8. Sample Threat Actors and Motivations.mp4
11.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/016-720.webm
11.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/69. Lab Debrief.mp4
11.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/018-720.webm
11.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2019/560.5.pdf
11.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/004-720.webm
11.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/027-720_Malware_Memory_Forensics.webm
11.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/21.mp4
11.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/14.webm
11.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2019/560.3.pdf
11.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/20. iOS Screen Snapshots.mp4
11.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/012-720.webm
11.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/6.mp4
11.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.23.mp4
11.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/13.webm
11.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/008-720_Recognizing_Packed_Malware.webm
11.2 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/4.mp4
11.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/2. The Dark Web/7.mp4
11.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/17.mp4
11.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/29.mp4
11.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.11.mp4
11.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/2.mp4
11.1 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/008-720.webm
11.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_7.webm
11.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/015-720.webm
11.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/06.webm
11.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/005-720.webm
11.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/8.mp4
11.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/016-720.webm
11.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2019/560.2.pdf
11.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/22. iPremier Case C Debrief.mp4
11.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/8.mp4
11.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/7. Usagestats Timestamps.mp4
11.1 MB
SEC503 - Network Intrusion Detection/video/2018/5.1 Intro - Network traffic forensics/001-720.webm
11.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/1.webm
11.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/3. Compare to Must and May.mp4
11.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/13.mp4
11.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/03.webm
11.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/76. Lab 14 Solution Fill in the Strategy Map 2.mp4
11.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/003-720.webm
11.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/019-720.webm
11.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/13. Dumpdecrypted.mp4
11.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/10.webm
11.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/3.mp4
11.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/006-720.webm
11.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/15.webm
11.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/013-720_Recognizing_Packed_Malware.webm
11.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/1/2.mp4
11.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/07.webm
11.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/014-720.webm
11.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/4.mp4
11.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/1. Course Roadmap.mp4
11.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.23.mp4
11.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/16.webm
11.0 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/4.mp4
11.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/2.webm
11.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.36.mp4
11.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/30.mp4
11.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/1. Security Assessment Strategies/3.mp4
10.9 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/6.mp4
10.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/10.mp4
10.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/4.webm
10.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/6. Call Logs 1.mp4
10.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.1 Introduction to Comprehensive Pen Test Planning, Scoping, and Recon/SEC560 - 1.1.7.mp4
10.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2019/560.4.pdf
10.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/16.webm
10.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/002-720.webm
10.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/4/1.mp4
10.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/22. Lab 41 Summary BlueGreen Deploy for Security.mp4
10.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/15.mp4
10.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/11.mp4
10.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/23.webm
10.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/006-720.webm
10.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/001-720.webm
10.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/20.mp4
10.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/022-720.webm
10.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/014-720.webm
10.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/22.webm
10.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/3.mp4
10.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/2. USB Accessories ModeLock.mp4
10.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/14.mp4
10.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/001-720.webm
10.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_12.webm
10.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/1.mp4
10.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_22.webm
10.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/09.webm
10.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/14. Photossqlite.mp4
10.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/55. Decision Matrix Analysis Example.mp4
10.7 MB
SEC511 - Continuous Monitoring and Security Operations/text/2019/511.1.pdf
10.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/8.webm
10.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.4.mp4
10.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/019-720.webm
10.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.5.mp4
10.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/1/1.mp4
10.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/39. Political Examples.mp4
10.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/11.webm
10.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/021-720.webm
10.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.8.mp4
10.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/37.mp4
10.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/22.webm
10.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/20.mp4
10.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_02.webm
10.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/76. Maturity Comparison Example.mp4
10.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/2. PowerShell for Local Users and Groups/6.mp4
10.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/34.webm
10.6 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/004-720.webm
10.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/2.webm
10.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/04.webm
10.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/19.mp4
10.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/4. iPremier Case A Group Discussion.mp4
10.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/023-720.webm
10.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/15.mp4
10.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.2 - Developer Created Defenses/003-720.webm
10.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/013-720.webm
10.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/7.mp4
10.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/32. Metrics Planning Worksheet.mp4
10.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/4.mp4
10.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/14. Choosing the Correct Timestamp Conversion.mp4
10.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/13.webm
10.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/10.webm
10.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/78. Course Roadmap 6.mp4
10.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/008-720.webm
10.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/27.mp4
10.6 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.5.pdf
10.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/9.mp4
10.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/13.webm
10.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/028-720.webm
10.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/60. Course Roadmap 5.mp4
10.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/47. Course Roadmap 4.mp4
10.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/15. Course Roadmap 2.mp4
10.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/011-720_Recognizing_Packed_Malware.webm
10.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_9.webm
10.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/10.webm
10.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/14.mp4
10.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/32.webm
10.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.8.mp4
10.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/035-720.webm
10.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/42.mp4
10.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/42. Course Roadmap 4.mp4
10.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/9. SMSMMS.mp4
10.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/8.webm
10.5 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/9.mp4
10.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/002-720.webm
10.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/13.webm
10.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/5. Missing Deleted SMS Messages.mp4
10.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/032-720.webm
10.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/017-720.webm
10.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/10.mp4
10.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/002-720.webm
10.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/17.mp4
10.4 MB
SEC450 - Blue Team Fundamentals. Security Operations and Analysis/text/2019/450.5.pdf
10.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/42. Lab 12 Relationship Management Group Discussion.mp4
10.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/13.webm
10.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/68. Porters Five Forces Antivirus Example.mp4
10.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/7. Microservices Complexity Netflixs Topology Example.mp4
10.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/023-720.webm
10.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.1 INTRODUCTION TO ESSENTIAL SKILLS WORKSHOP/01.webm
10.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.29.mp4
10.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/18.webm
10.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/007-720.webm
10.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.5.mp4
10.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/19.mp4
10.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/034-720.webm
10.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/2. Why We Need to Decipher the Threats.mp4
10.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/4. Active Directory Permissions and Delegation of Authority for Damage Containment/6.mp4
10.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/08.webm
10.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/13.webm
10.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/04.webm
10.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/1. Mobile Penetration Testing/5. What Is Being Tested.mp4
10.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/011-720.webm
10.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/003-720.webm
10.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/7.mp4
10.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/4.mp4
10.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/005-720.webm
10.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/3.mp4
10.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/14.mp4
10.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/25. Course Roadmap 4.mp4
10.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/13.mp4
10.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/4.mp4
10.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/031-720.webm
10.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/71.mp4
10.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.5.mp4
10.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/2.webm
10.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/3. iCloud Extractions/9. Additional Features.mp4
10.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/095-720.webm
10.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.5.mp4
10.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/010-720.webm
10.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/15.webm
10.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/08.webm
10.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/9.mp4
10.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/9. Security History.mp4
10.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/text/2019/487.4.pdf
10.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/076-720.webm
10.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/text/2020/498.2.pdf
10.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/11.mp4
10.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.1 Introduction to Comprehensive Pen Test Planning, Scoping, and Recon/SEC560 - 1.1.4.mp4
10.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/26.webm
10.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/011-720.webm
10.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.7.mp4
10.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/026-720.webm
10.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/2. Network Activity Analysis.mp4
10.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2018/610.1.pdf
10.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Enable permissive mode.ogv
10.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/14.webm
10.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/002-720.webm
10.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/24.webm
10.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/010-720.webm
10.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.5.mp4
10.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/42.mp4
10.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/15.webm
10.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/25. Compare the Apps Functionality to What is Parsed.mp4
10.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/027-720.webm
10.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/09.webm
10.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/19.mp4
10.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/027-720.webm
10.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/025-720.webm
10.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/1.mp4
10.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/009-720.webm
10.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/12.webm
10.1 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/1. Core Windows Forensics II USB Devices and Shell Items Introduction/5.mp4
10.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/81.mp4
10.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/19. Fitbit Background.mp4
10.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/52. Fitbit Case Exercise.mp4
10.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/3.mp4
10.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/18.mp4
10.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.2.mp4
10.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/21. iPremier Case C Group Discussion.mp4
10.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_7.webm
10.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/6. ADB Getting Connected 1.mp4
10.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/20.webm
10.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/01.webm
10.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/007-720.webm
10.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/16.webm
10.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.1 Moving Files with Exploits/SEC560 - 4.1.3.mp4
10.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/8.mp4
10.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/11.mp4
9.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/018-720.webm
9.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/5.webm
9.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/25.mp4
9.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/33.mp4
9.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/4.mp4
9.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_04.webm
9.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/7.mp4
9.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_05.webm
9.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/22.mp4
9.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/18.mp4
9.9 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.2.pdf
9.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/29. Policy Pyramid.mp4
9.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/12.webm
9.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/43.mp4
9.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/017-720.webm
9.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/11.mp4
9.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/50.mp4
9.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/042-720.webm
9.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/9.mp4
9.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/2.mp4
9.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.65.mp4
9.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.3 BloodHound/SEC560 - 5.3.4.mp4
9.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/3. Collecting User Information/5.mp4
9.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/11.mp4
9.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/21. PayPal Example.mp4
9.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/039-720.webm
9.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/1.mp4
9.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/51. Fitbit Case Scenario Refresher.mp4
9.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/11.webm
9.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/04.webm
9.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/3. iOS File System Structures/6. Advanced Logical Data Obtained.mp4
9.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/30.mp4
9.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/018-720.webm
9.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/25. Simplify Output.mp4
9.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/7. Component Extras.mp4
9.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/4. Elcomsoft Phone Password Breaker.mp4
9.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_15.webm
9.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/13.mp4
9.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/004-720.webm
9.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/004-720.webm
9.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/17.mp4
9.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/011-720.webm
9.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/1. Course Roadmap.mp4
9.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/15.webm
9.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/16.webm
9.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/1.webm
9.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/27.mp4
9.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/012-720_Debugging_Packed_Malware.webm
9.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/012-720.webm
9.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/006-720.webm
9.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_14.webm
9.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/020-720.webm
9.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/3. Internet Browser Forensics/1.mp4
9.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/13.mp4
9.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.1 - Introduction to Alternative Web Interfaces/003-720.webm
9.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/5.webm
9.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/text/2019/487.2.pdf
9.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.1/SANS OnDemand3.webm
9.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/095-720.webm
9.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/9.mp4
9.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/35.mp4
9.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/050-720.webm
9.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/47.mp4
9.7 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/text/2016/SANS SEC501.6 Data Loss Prevention.pdf
9.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/033-720.webm
9.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/09.webm
9.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/021-720.webm
9.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/11.mp4
9.7 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/12.mp4
9.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.6.mp4
9.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/26.webm
9.6 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/28.mp4
9.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/1.mp4
9.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Extra/XDMCP.ogv
9.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/1.webm
9.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.5.mp4
9.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.49.mp4
9.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/4.webm
9.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/026-720.webm
9.6 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/Open Ports and Establish Sessions.ogv
9.6 MB
SEC450 - Blue Team Fundamentals. Security Operations and Analysis/text/2019/450.3.pdf
9.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/23.mp4
9.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/2.webm
9.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/4/6.mp4
9.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/11.webm
9.6 MB
SEC450 - Blue Team Fundamentals. Security Operations and Analysis/text/2019/450.1.pdf
9.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/63.mp4
9.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/03.webm
9.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/44.webm
9.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/35.mp4
9.5 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.1.pdf
9.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.22.mp4
9.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/26. Course Roadmap 3.mp4
9.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/8.mp4
9.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/06_2.webm
9.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/7.mp4
9.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/25.webm
9.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/026-720.webm
9.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.15.mp4
9.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.56.mp4
9.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.9.mp4
9.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.8/002-720.webm
9.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/21.mp4
9.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.1 INTRODUCTION TO ESSENTIAL SKILLS WORKSHOP/06.webm
9.5 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/006-720.webm
9.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/2/1.mp4
9.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/18.mp4
9.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/010-720.webm
9.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/35.mp4
9.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/11. MANINTHEMIDDLE not always easy.mp4
9.4 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/3.mp4
9.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/18.mp4
9.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/8.mp4
9.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/050-720.webm
9.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/017-720.webm
9.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/009-720.webm
9.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/22.webm
9.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/1.mp4
9.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/13.webm
9.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/8.mp4
9.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/10. Identifying Swift Apps.mp4
9.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/1.webm
9.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/004-720.webm
9.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/22. Course Roadmap 3.mp4
9.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/011-720.webm
9.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/32.mp4
9.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/1. iOS Forensics Overview/7. iCloud Sync.mp4
9.4 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/22.mp4
9.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/04.webm
9.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/07.webm
9.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/5. The Golden Age of Mobile.mp4
9.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/3.mp4
9.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/8. Android Backups/6. Backup File Analysis Commercial Support.mp4
9.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/3. Core Windows Forensics Focus on Analysis/5.mp4
9.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/1.mp4
9.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/8.mp4
9.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/14.webm
9.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.3 Motivation and Definitions/SEC560 - 4.3.3.mp4
9.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/7.webm
9.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.1 Introduction Defense-in-Depth and Attacks/2.webm
9.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/012-720.webm
9.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/15.webm
9.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/013-720.webm
9.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/15.mp4
9.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/018-720.webm
9.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/6.mp4
9.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/8. Mobile Is Here to Stay.mp4
9.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/13.mp4
9.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/94.mp4
9.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/16.mp4
9.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/2.mp4
9.2 MB
SEC530 - Defensible Security Architecture and Engineering/text/2019/530.4.pdf
9.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/9. Locating Attachments by Joining Two Tables.mp4
9.2 MB
SEC530 - Defensible Security Architecture and Engineering/text/2019/530.5.pdf
9.2 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/5.mp4
9.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.1 Introduction to Comprehensive Pen Test Planning, Scoping, and Recon/SEC560 - 1.1.3.mp4
9.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/013-720.webm
9.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.4.mp4
9.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/9. Match and Replace Example.mp4
9.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/4.webm
9.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/027-720.webm
9.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/73.mp4
9.2 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/019-720.webm
9.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/4.mp4
9.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/41.mp4
9.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.1 - Introduction to Web Cryptography/002-720.webm
9.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/4. XSS Example.mp4
9.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/2. Network Manipulation Attacks.mp4
9.1 MB
SEC450 - Blue Team Fundamentals. Security Operations and Analysis/text/2019/450.4.pdf
9.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/12.webm
9.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/21.webm
9.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/007-720.webm
9.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/24.webm
9.1 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.3.pdf
9.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/13.mp4
9.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/003-720.webm
9.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/7.webm
9.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.5 - Crypto Exploit Concepts/003-720.webm
9.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/2.mp4
9.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/15.mp4
9.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/5.mp4
9.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.19.mp4
9.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/009-720.webm
9.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_14.webm
9.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/005-720.webm
9.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/21.mp4
9.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/02.webm
9.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_18.webm
9.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/002-720.webm
9.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/13.mp4
9.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/20. SMART Exercise 5.mp4
9.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/1.mp4
9.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.10.mp4
9.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/021-720.webm
9.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/3.mp4
9.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/3.mp4
9.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/013-720.webm
9.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/20.mp4
9.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/027-720.webm
9.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.3.mp4
9.0 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/46.mp4
9.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/003-720.webm
9.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/39. Relationship Planning Example.mp4
9.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.1 Introduction to Comprehensive Pen Test Planning, Scoping, and Recon/SEC560 - 1.1.2.mp4
9.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.7.mp4
9.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/51.webm
9.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/014-720.webm
9.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/7.webm
9.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/1. Classify Information and Supporting Assets/6.mp4
9.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/2. PowerShell for Local Users and Groups/3.mp4
9.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/008-720.webm
9.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/20.mp4
9.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/2.mp4
9.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/10.webm
9.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/3.mp4
9.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/046-720_Analyzing_Multi-Technology_Malware.webm
9.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/077-720.webm
9.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/10.webm
9.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/16. How the WAL Gets Populated Checkpoint.mp4
8.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/5. AXIOM Fundamentals/5. AXIOM Exploring the Views.mp4
8.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/6.mp4
8.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.64.mp4
8.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/2. PowerShell for Local Users and Groups/7.mp4
8.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/020-720.webm
8.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.9.mp4
8.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/08.webm
8.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.5 Bootcamp - researching protocols/007-720.webm
8.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/2. What You Need to Know About iOS.mp4
8.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/013-720.webm
8.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.22.mp4
8.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/21.mp4
8.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.17.mp4
8.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/6.mp4
8.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/020-720.webm
8.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/29.mp4
8.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/1. Course Roadmap.mp4
8.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/08.webm
8.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/7. What Is the Difference Between a Vision and Mission Statement.mp4
8.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.1 Introduction Threat Management/2.webm
8.9 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/3. Internet Browser Forensics/5.mp4
8.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/9. Recovering Deleted Data from SQLite Databases 1.mp4
8.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/3.mp4
8.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/3.mp4
8.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/11. Koodous.mp4
8.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/24. ThirdParty Application Location Artifacts 2.mp4
8.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/06.webm
8.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/019-720_Analyzing_Multi-Technology_Malware.webm
8.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_08.webm
8.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/25.mp4
8.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/37. Course Roadmap 3.mp4
8.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/13.webm
8.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/004-720.webm
8.8 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/istat.ogv
8.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/36.mp4
8.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/95.mp4
8.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/016-720_Using_Debuggers_for_Dumping.webm
8.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/014-720.webm
8.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/11. Interacting with Applications through AM.mp4
8.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/26. Detecting ALL the Evidence Usually Requires TEST DATA.mp4
8.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/14.mp4
8.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/7.mp4
8.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/005-720.webm
8.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/29. Language of Policy.mp4
8.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/9.mp4
8.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/80.webm
8.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/10.mp4
8.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/7.mp4
8.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.4.mp4
8.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/06.webm
8.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/10.mp4
8.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/028-720.webm
8.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/20.webm
8.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.32.mp4
8.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.5.mp4
8.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.9.mp4
8.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/003-720.webm
8.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/044-720.webm
8.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/016-720.webm
8.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/3. How to Develop an Understanding of the Business.mp4
8.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/5.mp4
8.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/7.mp4
8.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/011-720.webm
8.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/008-720.webm
8.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/10.mp4
8.7 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/11.mp4
8.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/12.webm
8.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/027-720.webm
8.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/18.webm
8.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/12.mp4
8.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/009-720.webm
8.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/016-720.webm
8.7 MB
SEC506 - Securing Linux-Unix/video/2011/Day 3 - Hardening Unix-Linux Systems Part 3/Extra/X33 Forwarding.ogv
8.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/021-720.webm
8.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/06.webm
8.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/5. Wear Leveling Explained.mp4
8.7 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/3.mp4
8.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.3 COURSE LOGISTICS/SEC542- SANS OnDemand_2.webm
8.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/2.webm
8.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/016-720.webm
8.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/1. Background/1. Strategic Planning Workshop 1.mp4
8.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.7 HTTP SYNTAX AND MESSAGING/SEC542- SANS OnDemand_4.webm
8.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/1. Security Assessment Strategies/6.mp4
8.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/14.mp4
8.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/7.mp4
8.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/008-720.webm
8.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/028-720.webm
8.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/9.mp4
8.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.19.mp4
8.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/6.mp4
8.6 MB
SEC511 - Continuous Monitoring and Security Operations/text/2019/511.3.pdf
8.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/43.mp4
8.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/028-720.webm
8.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/028-720 (1).webm
8.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/22.mp4
8.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.1 - Introduction to Web Frameworks/002-720.webm
8.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/12.mp4
8.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/6.webm
8.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/23.mp4
8.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/1.webm
8.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/4.webm
8.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/12.webm
8.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/14.mp4
8.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/16.mp4
8.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/16.webm
8.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/014-720.webm
8.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/10.webm
8.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/013-720_Getting_Started_with_Unpacking.webm
8.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/02.webm
8.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/004-720.webm
8.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/30.mp4
8.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/019-720.webm
8.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/004-720.webm
8.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/37.webm
8.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/014-720.webm
8.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/8.webm
8.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/39.webm
8.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/3.mp4
8.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.3.mp4
8.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_02.webm
8.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/25.webm
8.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/16.webm
8.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/06_2.webm
8.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/024-720.webm
8.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/19.webm
8.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.24.mp4
8.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.7.mp4
8.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/1.mp4
8.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/8.webm
8.5 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/15.mp4
8.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/26.webm
8.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/6. Forensic Capstone Prep/2. Forensic Challenge Prep.mp4
8.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/37. Course Roadmap 4.mp4
8.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/8.webm
8.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/7. Serverless Security Container Runtime Persistence.mp4
8.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/9.mp4
8.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/12.mp4
8.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/14.mp4
8.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/004-720.webm
8.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.10.mp4
8.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/15.webm
8.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/002-720.webm
8.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/6.mp4
8.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/007-720.webm
8.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/09.webm
8.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/17.webm
8.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/026-720.webm
8.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/004-720.webm
8.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/004-720 (1).webm
8.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/13. Attempts to Remove Tool Traces.mp4
8.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/06.webm
8.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/32. Policies Should Reduce Risk.mp4
8.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/11.webm
8.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.1.mp4
8.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/021-720.webm
8.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/020-720.webm
8.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/3.mp4
8.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/10. Rapid Risk Assessments.mp4
8.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/002-720.webm
8.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/031-720.webm
8.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/005-720.webm
8.4 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/15.mp4
8.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/04.webm
8.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/8. Drozer Console Start Empty Intent.mp4
8.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/11.mp4
8.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/03.webm
8.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/027-720.webm
8.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/2.webm
8.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/026-720.webm
8.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/002-720.webm
8.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/1. Course Roadmap 1.mp4
8.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/8.mp4
8.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/004-720.webm
8.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/4.webm
8.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/1.webm
8.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/11. iOS Encryption Data Protection.mp4
8.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/013-720.webm
8.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/009-720.webm
8.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/18.mp4
8.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/015-720.webm
8.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/7.mp4
8.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_03.webm
8.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2018/610.2.pdf
8.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/003-720.webm
8.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/71.mp4
8.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/8.webm
8.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/17.mp4
8.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/16.mp4
8.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/19.mp4
8.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/107-720.webm
8.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/5. Loss Impact.mp4
8.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/12.mp4
8.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/009-720.webm
8.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/011-720_Malware_Memory_Forensics.webm
8.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/7. Writing Dockerfiles.mp4
8.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/26.mp4
8.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/3. Proof of SD Card Existence externaldb.mp4
8.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/23.webm
8.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/16.webm
8.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/5. Policy Awareness and Training.mp4
8.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/015-720.webm
8.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/010-720_Recognizing_Packed_Malware.webm
8.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2018/610.Workbook.pdf
8.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/15.mp4
8.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/002-720.webm
8.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/040-720.webm
8.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/14.mp4
8.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/19.mp4
8.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/2.webm
8.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 2 - Hardening Unix-Linux Systems Part 2/Extra/An Alternate Approach.ogv
8.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/13.mp4
8.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/027-720.webm
8.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/1.webm
8.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/009-720.webm
8.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/17.mp4
8.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/03.webm
8.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/5.mp4
8.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/003-720_Code_Injection_API_Hooking.webm
8.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/3. iOS Tech Specs.mp4
8.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/04.webm
8.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/54.mp4
8.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/28.mp4
8.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/002-720.webm
8.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.15.mp4
8.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/4.webm
8.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/1.mp4
8.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/80. Policy Set for Vulnerability Management.mp4
8.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.7.mp4
8.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/12.mp4
8.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/45. Managing and Leading Change.mp4
8.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/075-720.webm
8.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/12.webm
8.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/11. Testing Is important.mp4
8.1 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/12.mp4
8.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/005-720.webm
8.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/13.webm
8.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/9.mp4
8.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.87.mp4
8.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/16. How To Change People Without Causing Resentment.mp4
8.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/1/2.mp4
8.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/002-720.webm
8.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/009-720.webm
8.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.13.mp4
8.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/004-720.webm
8.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/8. Microservices TradeOffs.mp4
8.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/60. What Is Intels Roadmap for BYOD.mp4
8.1 MB
SEC511 - Continuous Monitoring and Security Operations/text/2019/511.5.pdf
8.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/02.webm
8.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/14.webm
8.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/02.webm
8.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/11.mp4
8.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/46.mp4
8.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/31.mp4
8.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/010-720.webm
8.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/05.webm
8.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/035-720.webm
8.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/13. BLU R1 HD Root Process 6.mp4
8.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/27.mp4
8.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/017-720.webm
8.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/003-720.webm
8.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/022-720.webm
8.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/2. Security Evaluation Models/5.mp4
8.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.69.mp4
8.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/4.webm
8.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/70. Lab 1 5 Solution Defense Identification.mp4
8.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/text/2019/487.5.pdf
8.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.20.mp4
8.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.3.mp4
8.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/1. Course Roadmap.mp4
8.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/04.webm
8.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/16.webm
8.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/39.mp4
8.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/019-720.webm
8.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/71. Approaches to Building a Security Business Case 2.mp4
8.0 MB
SEC201 - Computing & Technology Essentials/text/2017/SEC201_2_C01_01.pptx
8.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/06_2.webm
8.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/40.mp4
8.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/11.webm
8.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/2.mp4
8.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2019/542.1.pdf
8.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/5.mp4
8.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/11.webm
8.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/22.mp4
8.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/22.mp4
8.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/10. Azure Security Features.mp4
8.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/11.mp4
8.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/17. Is the Database Using Journaling or WAL.mp4
8.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/4.mp4
8.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/5.mp4
7.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/015-720.webm
7.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/014-720.webm
7.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/17.mp4
7.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/026-720.webm
7.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/22.mp4
7.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/15.mp4
7.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/10.mp4
7.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/15.mp4
7.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/15. AWS WAF Security Automations Architecture.mp4
7.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.3 - Web Framework Defenses/002-720.webm
7.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/011-720.webm
7.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/14.webm
7.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/006-720.webm
7.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/001-720.webm
7.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/003-720.webm
7.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/2. Strategic Planning Process.mp4
7.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_14.webm
7.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.2.mp4
7.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/20.mp4
7.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/16.mp4
7.9 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/014-720.webm
7.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/005-720.webm
7.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/001-720.webm
7.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.5 - Crypto Exploit Concepts/004-720.webm
7.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/05.webm
7.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/009-720.webm
7.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/020-720.webm
7.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/22.mp4
7.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/5.mp4
7.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/066-720.webm
7.8 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/003-720.webm
7.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/014-720.webm
7.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/9.webm
7.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/4. Android IPC Intents.mp4
7.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/20.webm
7.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/13.mp4
7.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/41.mp4
7.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/29.webm
7.8 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/013-720.webm
7.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/7.webm
7.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/016-720.webm
7.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/003-720.webm
7.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/004-720.webm
7.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/011-720.webm
7.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/06.webm
7.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/2. Course Summary 1.mp4
7.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.7.mp4
7.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/21. Hopper.mp4
7.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/015-720.webm
7.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/2.mp4
7.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.13.mp4
7.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/10.webm
7.8 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/10.mp4
7.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/16.mp4
7.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/29.mp4
7.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/31. Lab 2 5 Security Metrics.mp4
7.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.1/001-720.webm
7.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/6.webm
7.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/48.mp4
7.7 MB
SEC506 - Securing Linux-Unix/text/2019/506.1-3.pdf
7.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/024-720.webm
7.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/14. Bypassing HSTS.mp4
7.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/027-720.webm
7.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/08.webm
7.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.2 Pilfering from Target Machines/SEC560 - 4.2.3.mp4
7.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/15.mp4
7.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/6.mp4
7.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/016-720.webm
7.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/18.webm
7.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/018-720.webm
7.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/12.mp4
7.7 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/010-720.webm
7.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/29.mp4
7.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/9.mp4
7.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.1 Why Exploitation/SEC560 - 3.1.6.mp4
7.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/34. Lab 2 5 Security Metrics Debrief.mp4
7.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/6. iOS Application Interaction/8. Action Extension Bing Translate.mp4
7.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/63.webm
7.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/018-720.webm
7.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/18. Git CommitWorkflow Hooks.mp4
7.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/37.mp4
7.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/006-720.webm
7.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/011-720.webm
7.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/008-720.webm
7.6 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/6.mp4
7.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/022-720.webm
7.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/11. Technology Risk Graph.mp4
7.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.3 BloodHound/SEC560 - 5.3.2.mp4
7.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/014-720.webm
7.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/14.webm
7.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_3.webm
7.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/93.mp4
7.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/6.mp4
7.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/1. Course Roadmap 1.mp4
7.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/8.mp4
7.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.8/007-720.webm
7.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/30.mp4
7.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_18.webm
7.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/8.mp4
7.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/3. Flow Control Conditional Testing and Loops/2.mp4
7.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/1.webm
7.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/10.webm
7.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/21.webm
7.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/21. Dynamic Text and Dictionary.mp4
7.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/11.webm
7.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/43.mp4
7.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/17.mp4
7.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/13. Protect the Company New York Post Privacy Policy.mp4
7.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_9_2.webm
7.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/014-720.webm
7.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/5. Obfuscated Android Methods.mp4
7.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/15.mp4
7.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/003-720.webm
7.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/58.mp4
7.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/10.webm
7.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/11.webm
7.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/54. Decision Matrix Analysis.mp4
7.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/18. Higher Education Mission.mp4
7.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/004-720.webm
7.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/12.mp4
7.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/01.webm
7.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/2.webm
7.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/036-720.webm
7.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/1.mp4
7.5 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/19.mp4
7.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/37. Jashopper Case Overview.mp4
7.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/48.mp4
7.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.100.mp4
7.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/10. A Potential Solution for Previously Encrypted Backups.mp4
7.5 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/3. Core Windows Forensics Focus on Analysis/4.mp4
7.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/21.webm
7.5 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/fdisk and mount.ogv
7.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/02.webm
7.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/023-720.webm
7.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/2.mp4
7.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/1.mp4
7.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/1/3.mp4
7.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/006-720_Recognizing_Packed_Malware.webm
7.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/7.mp4
7.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/003-720.webm
7.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.10.mp4
7.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/9. GrayKey Password Guessing.mp4
7.4 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/7.mp4
7.4 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/23.mp4
7.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/06.webm
7.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/011-720.webm
7.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/12.webm
7.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/20. Apple Maps 1 Its a MESS.mp4
7.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/4.mp4
7.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/18. Jobs To Be Done Theory.mp4
7.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/06.webm
7.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/31.mp4
7.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/015-720.webm
7.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/18.mp4
7.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/72.mp4
7.4 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/10.mp4
7.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/text/2019/487.1.pdf
7.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/14.webm
7.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/007-720.webm
7.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/030-720.webm
7.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/24. Python PlugIns and Free Parsers.mp4
7.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/3.mp4
7.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/006-720.webm
7.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/006-720.webm
7.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/009-720.webm
7.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/5. Cycript.mp4
7.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/55. Lab 13 Core Values.mp4
7.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/10.webm
7.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.1 WHY THE WEB/SEC542- SANS OnDemand_6.webm
7.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/1. Android Forensics Agenda.mp4
7.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/02.webm
7.3 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/018-720.webm
7.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/020-720.webm
7.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/15.webm
7.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/06.webm
7.3 MB
SEC201 - Computing & Technology Essentials/text/2017/SEC201_4_C01_01.pptx
7.3 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/034-720.webm
7.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.12 SUMMARY/SEC542- SANS OnDemand.webm
7.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/025-720.webm
7.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/3. Internet Browser Forensics/4.mp4
7.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/008-720.webm
7.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/007-720.webm
7.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/2. The Dark Web/4.mp4
7.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/42.mp4
7.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/07.webm
7.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/04.webm
7.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/20. Lab 11 Fitbit Case Discussion.mp4
7.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/021-720.webm
7.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/011-720.webm
7.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/17. otool Library Disclosure.mp4
7.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/11.mp4
7.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/33.webm
7.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.2.mp4
7.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/12. Alternative decompilers 2.mp4
7.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/21. Course Roadmap 2.mp4
7.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/022-720.webm
7.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.7.mp4
7.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/058-720.webm
7.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_4.webm
7.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/5.mp4
7.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/013-720.webm
7.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/005-720.webm
7.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/1.mp4
7.2 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/023-720.webm
7.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/018-720.webm
7.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/018-720.webm
7.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/6. Physical Analyzer Browsing the File System.mp4
7.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/13.webm
7.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/14.mp4
7.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/50. Development Examples 1.mp4
7.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/03.webm
7.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/18.mp4
7.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/13.webm
7.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/dstat and ifind.ogv
7.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/003-720.webm
7.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/21. European Union Privacy.mp4
7.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/066-720.webm
7.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/20. Health Validate Tool Findings.mp4
7.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/12.webm
7.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/004-720.webm
7.2 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2019/SEC617.1 - WiFi Data Collection and Analysis.pdf
7.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/3. What Next.mp4
7.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/2.webm
7.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/004-720.webm
7.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/001-720 (2).webm
7.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/3. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction 2.mp4
7.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/25.webm
7.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/22.webm
7.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/1. Introduction to Device Architecture and Common Mobile Threats/2. Course Outline.mp4
7.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/08.webm
7.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/22.webm
7.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/13.mp4
7.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/29.webm
7.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.74.mp4
7.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/15.webm
7.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/10.mp4
7.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/15.webm
7.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/05.webm
7.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.14.mp4
7.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.17.mp4
7.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/18.webm
7.1 MB
SEC506 - Securing Linux-Unix/video/2011/Day 3 - Hardening Unix-Linux Systems Part 3/Extra/Agent forwarding.ogv
7.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/12. Continuous Deployment.mp4
7.1 MB
SEC545 - Cloud Security Architecture and Operations/text/2020/545.3.pdf
7.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/20.mp4
7.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/10.mp4
7.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/6.mp4
7.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/2. Locked Android Devices/8. Acquisition Considerations and Suggested Steps.mp4
7.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/15.webm
7.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/4.mp4
7.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/004-720.webm
7.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/59. Lab Debrief.mp4
7.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/036-720.webm
7.1 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/14.mp4
7.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/032-720.webm
7.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/42.mp4
7.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/43.webm
7.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/14.webm
7.1 MB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/007-720.webm
7.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/005-720_Malware_Memory_Forensics.webm
7.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/17.webm
7.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/9.mp4
7.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/22.mp4
7.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2019/642.3.pdf
7.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/13.mp4
7.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/001-720_Recognizing_Packed_Malware.webm
7.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.4.mp4
7.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/3. Android Tech Specs.mp4
7.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/11. MDM and MAM Applications.mp4
7.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.3.mp4
7.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/023-720.webm
7.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/14. Discord Yet Another Way Applications Store Attachments.mp4
7.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/7.mp4
7.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/015-720.webm
7.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/27.webm
7.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.12.mp4
7.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/01.webm
7.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/19.mp4
7.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.14.mp4
7.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/03.webm
7.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/5. AXIOM Fundamentals/3. AXIOM Image Loaded.mp4
7.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/6.mp4
7.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/5.mp4
7.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/ffind.ogv
7.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/17.webm
7.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/64. Vertical Versus Horizontal Business Models.mp4
7.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/002-720.webm
7.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/31.webm
7.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/1.webm
7.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/6.mp4
7.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/003-720_Debugging_Packed_Malware.webm
7.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/012-720.webm
7.0 MB
SEC505 - Securing Windows and PowerShell Automation/text/2020/505.4.pdf
7.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/76. Gauntlt Attacks Example.mp4
7.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/5.mp4
7.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/7. Android Forensics Overview/7. FDE vs FBE.mp4
7.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/062-720.webm
7.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/014-720.webm
7.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/67. Porters Five Forces Characteristics.mp4
7.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/6. Continuous Delivery Automating and Standardizing Change.mp4
7.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/028-720.webm
7.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.62.mp4
7.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/014-720.webm
7.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/10.mp4
7.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/019-720.webm
7.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/9. DevOps Audit Defense Toolkit Separation of Duties.mp4
7.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/8.mp4
7.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.9.mp4
7.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/02.webm
7.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/19. Alternative Storage Formats Realm Databases.mp4
7.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/15.mp4
7.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/3.mp4
6.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/13.mp4
6.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/26.webm
6.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/005-720.webm
6.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/15.webm
6.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/12. Plist Timestamp Examination Considerations.mp4
6.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/12.webm
6.9 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.6 Capstone Design, Detect, Defend.pdf
6.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.4.mp4
6.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/19. Finding Stuff in iOS.mp4
6.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/10. QARK ANALYSIS RESULTS.mp4
6.9 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2019/660.1 - Network Attacks for Penetration Testers.pdf
6.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/4.mp4
6.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/16.mp4
6.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/10.webm
6.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/2. Azure Storage Security.mp4
6.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/57.webm
6.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/15.webm
6.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_19.webm
6.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/9. Interesting SQLite Files.mp4
6.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/4.mp4
6.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/011-720.webm
6.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.14.mp4
6.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/51. Email Risks.mp4
6.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/003-720.webm
6.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/04.webm
6.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/017-720.webm
6.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/021-720.webm
6.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/46.mp4
6.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.6.mp4
6.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/39.mp4
6.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/6. Garbage Collection.mp4
6.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/005-720.webm
6.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/6.webm
6.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/2.mp4
6.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/2. PowerShell for Local Users and Groups/8.mp4
6.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/16.mp4
6.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/017-720.webm
6.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.3 TUPLES/4.webm
6.9 MB
SEC573 - Automating Information Security with Python/text/2020/573.3-5.pdf
6.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/10.webm
6.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/004-720.webm
6.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/34.mp4
6.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/21.webm
6.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/53.mp4
6.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/046-720.webm
6.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/17.mp4
6.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/44.mp4
6.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/021-720.webm
6.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/002-720.webm
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/18.webm
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/19.webm
6.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/24. Microservice Security Authorization and Access Control.mp4
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/01.webm
6.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/030-720.webm
6.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/3.mp4
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/07.webm
6.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/009-720.webm
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/01.webm
6.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.2 Sniffing with tcpdump/SEC560 - 2.2.4.mp4
6.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/22.webm
6.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/079-720.webm
6.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/3. iOS Data Protection Hierarchy.mp4
6.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/032-720.webm
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/18.webm
6.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/24.mp4
6.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/022-720.webm
6.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/10.mp4
6.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/4. Smart Token Multifactor Authentication/3.mp4
6.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/007-720.webm
6.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_10.webm
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/11.webm
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.3 TUPLES/03.webm
6.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/012-720.webm
6.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/7.webm
6.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/016-720.webm
6.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.12.mp4
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/03.webm
6.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/9.webm
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/07.webm
6.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/13.mp4
6.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/22.webm
6.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/8.webm
6.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/28.mp4
6.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.16.mp4
6.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/018-720.webm
6.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/4.mp4
6.7 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/28.mp4
6.7 MB
SEC545 - Cloud Security Architecture and Operations/text/2020/545.4.pdf
6.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/9. Types of Root Access.mp4
6.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.18.mp4
6.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/007-720.webm
6.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/17.mp4
6.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_15.webm
6.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/8. Android Backups/4. Creating a Backup File Using UFED.mp4
6.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/20.mp4
6.7 MB
SEC530 - Defensible Security Architecture and Engineering/text/2019/530.6.pdf
6.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/9.mp4
6.7 MB
SEC540 - Cloud Security and DevOps Automation/text/2020/540.1.pdf
6.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/13.webm
6.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/01.webm
6.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.7.mp4
6.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/064-720.webm
6.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_11.webm
6.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/46.mp4
6.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/010-720.webm
6.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/021-720_Analyzing_Multi-Technology_Malware.webm
6.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/45. Resources.mp4
6.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/013-720.webm
6.7 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2019/660.2 - Crypto and Post-Exploitation.pdf
6.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/16. Career Management PIE.mp4
6.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.5.mp4
6.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/42.mp4
6.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/03.webm
6.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/007-720_Malware_Memory_Forensics.webm
6.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/22.mp4
6.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/45.webm
6.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/16.mp4
6.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/10.mp4
6.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/029-720.webm
6.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/003-720.webm
6.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/020-720.webm
6.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/1.mp4
6.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/2. iOS Data protection API.mp4
6.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/005-720.webm
6.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/8.mp4
6.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/1. Introduction to Smartphone Overview Fundamentals of Analysis SQLite/6. Smartphone Forensic Analysis InDepth Course Agenda.mp4
6.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/12.webm
6.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_13.webm
6.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/17.mp4
6.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/1.mp4
6.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/14.webm
6.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.25.mp4
6.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_10.webm
6.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/3.mp4
6.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/007-720.webm
6.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/032-720.webm
6.6 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/14.mp4
6.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/2/2.mp4
6.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/11.webm
6.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/1/1.mp4
6.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/21.mp4
6.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.7 HTTP SYNTAX AND MESSAGING/SEC542- SANS OnDemand_8.webm
6.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/11. Vrooms Expectancy Theory.mp4
6.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/19.webm
6.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/12.webm
6.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/20. Alternative Storage Formats Protobufs.mp4
6.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/1.mp4
6.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/16. Unencrypted Binary Strings.mp4
6.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/5. Handling Locked iOS Devices/7. BFU.mp4
6.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_5.webm
6.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/69. Responding to Competitive Forces Examples.mp4
6.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/13.webm
6.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/007-720.webm
6.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/9.mp4
6.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/010-720.webm
6.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/014-720.webm
6.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/6.mp4
6.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/20.mp4
6.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/09.webm
6.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/3.mp4
6.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/14.mp4
6.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/9. BlueGreen Deployment Virtual Machines.mp4
6.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/13.mp4
6.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/015-720.webm
6.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/32. Static Analysis Step 3 Viewing Decompiled Code with JADX.mp4
6.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/7.webm
6.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/11. Protecting PII Example.mp4
6.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/4.mp4
6.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/22.mp4
6.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/13. Multimedia Files EXIF Data and Deletion.mp4
6.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/3.mp4
6.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/11.mp4
6.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/016-720.webm
6.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/60. Market and Communicate To Employees.mp4
6.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/010-720.webm
6.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/006-720.webm
6.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.1 WHY THE WEB/SEC542- SANS OnDemand.webm
6.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/text/2020/564.Workbook.pdf
6.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/6. Google Cloud Extractions and Analysis/2. Google Cloud Backup.mp4
6.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/027-720.webm
6.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_4.webm
6.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/22.webm
6.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/004-720.webm
6.5 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/3.mp4
6.5 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/36.mp4
6.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/15. RiskBased Decision Making.mp4
6.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/007-720.webm
6.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/007-720 (1).webm
6.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/12.mp4
6.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/032-720.webm
6.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/032-720 (1).webm
6.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/13.webm
6.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/22.webm
6.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/019-720.webm
6.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/15.webm
6.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/18. California Consumer Privacy Act CCPA.mp4
6.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/6.mp4
6.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/20.webm
6.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.16.mp4
6.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/030-720.webm
6.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/7. Configuration Management Ansible.mp4
6.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/8.webm
6.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/9.webm
6.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/26.mp4
6.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/25. Android Security Fix Process.mp4
6.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/26.mp4
6.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.5.mp4
6.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/41. Commit Stage Static Analysis Scanning in CD Pipeline.mp4
6.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/005-720.webm
6.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/12. Planning Is Fundamental.mp4
6.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/029-720_Code_Injection_API_Hooking.webm
6.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/6. Apktool.mp4
6.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/21.mp4
6.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/003-720.webm
6.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/27. App Intent Handling.mp4
6.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/22.mp4
6.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/18.mp4
6.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/013-720.webm
6.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/003-720.webm
6.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/18.webm
6.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/2. Cellebrite Overview.mp4
6.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/021-720.webm
6.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/10.webm
6.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/8.mp4
6.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/53. Managing Vulnerable Dependencies Component Analysis.mp4
6.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/2. PowerShell for Local Users and Groups/5.mp4
6.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/028-720.webm
6.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/21.mp4
6.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.1 INTRODUCTION TO AUTOMATED DEFENSE, FORENSICS AND OFFENSE/01.webm
6.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/004-720.webm
6.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/021-720.webm
6.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/7. No SQLite Check for Internet History Contained in LOG Files.mp4
6.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/1. About the Course/2.mp4
6.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/8. Information Overload.mp4
6.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/3.mp4
6.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/50. Risk Analysis.mp4
6.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/005-720.webm
6.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_09.webm
6.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_2.webm
6.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/013-720.webm
6.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/14.webm
6.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/39.mp4
6.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2019/514.1-2 - Case Studies.pdf
6.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/010-720.webm
6.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/027-720.webm
6.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/2.mp4
6.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/025-720.webm
6.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/8.mp4
6.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/32.mp4
6.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/16.mp4
6.4 MB
SEC505 - Securing Windows and PowerShell Automation/text/2020/505.5.pdf
6.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/023-720.webm
6.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/025-720.webm
6.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/02.webm
6.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/14. Cloak Dagger Attack Variations.mp4
6.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/1. Classify Information and Supporting Assets/9.mp4
6.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.1 Moving Files with Exploits/SEC560 - 4.1.7.mp4
6.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2019/514.2.pdf
6.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/34.mp4
6.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/16.mp4
6.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/72. Mapping to Strategic Objectives.mp4
6.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/8. Digital Download Package.mp4
6.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/007-720.webm
6.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/7. Roles and Responsibilities/3.mp4
6.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/12.mp4
6.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/11.webm
6.4 MB
SEC540 - Cloud Security and DevOps Automation/text/2020/540.3.pdf
6.4 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/18.mp4
6.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/23. Any App Can Store Payment Details.mp4
6.4 MB
SEC540 - Cloud Security and DevOps Automation/text/2020/540.2.pdf
6.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/8.mp4
6.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/11. Sample Application HelloWorld.mp4
6.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/19.webm
6.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/005-720.webm
6.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.3-Bypass Flaws/SEC542- SANS OnDemand_2.webm
6.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/022-720.webm
6.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/6.webm
6.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/010-720.webm
6.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/5.mp4
6.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/15.mp4
6.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/11.mp4
6.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_026/001-720.webm
6.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/8.mp4
6.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/004-720.webm
6.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/44.mp4
6.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/4.mp4
6.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/1.mp4
6.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/103-720.webm
6.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/12. Decompiled File Structure.mp4
6.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/66. ATTCK Enterprise Mitigations.mp4
6.3 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/031-720.webm
6.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/7.webm
6.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/006-720.webm
6.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/15.mp4
6.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/16.mp4
6.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/008-720.webm
6.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/25.webm
6.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/12. Android Download Mode.mp4
6.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/23.webm
6.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/17.webm
6.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_12.webm
6.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/12.mp4
6.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/022-720.webm
6.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/015-720.webm
6.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/023-720.webm
6.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/14. iPremier Read Case B.mp4
6.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/10. iBackupBot Method for Obtaining Log Files.mp4
6.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/02.webm
6.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/87.mp4
6.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/72. Courses of Action Matrix.mp4
6.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.3.mp4
6.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/1. Course Roadmap.mp4
6.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/006-720.webm
6.3 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/031-720.webm
6.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/24.webm
6.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/031-720.webm
6.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/31.mp4
6.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/26.mp4
6.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/26.mp4
6.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Makefile Example.ogv
6.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/18.mp4
6.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/27.webm
6.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/23.webm
6.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.1 Moving Files with Exploits/SEC560 - 4.1.1.mp4
6.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/12. Mixed Voicing and Typography.mp4
6.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/3. The Basics.mp4
6.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.27.mp4
6.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/1.mp4
6.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/11. Sysdiagnose The Apple Logging Profiles.mp4
6.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/27.webm
6.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/021-720.webm
6.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/3. Course Roadmap 1.mp4
6.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/40.mp4
6.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/07.webm
6.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/16.webm
6.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/026-720.webm
6.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/34. Course Roadmap 3.mp4
6.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/018-720.webm
6.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/08.webm
6.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/01.webm
6.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.26.mp4
6.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/1.mp4
6.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/18.mp4
6.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/10.webm
6.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/54.mp4
6.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/21. Three Leadership Styles.mp4
6.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/7. Making Sense of Your Location Artifacts.mp4
6.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/16.webm
6.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/19.mp4
6.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.5.mp4
6.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/06_2.webm
6.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/003-720.webm
6.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/6.mp4
6.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/015-720.webm
6.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/007-720.webm
6.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_5.webm
6.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/14. Acquisition Considerations and Suggested Steps.mp4
6.2 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/smart host.ogv
6.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/7. MobSF installation.mp4
6.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/7. iOS Data Execution Prevention WX.mp4
6.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/008-720.webm
6.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/6.mp4
6.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/028-720_Malware_Memory_Forensics.webm
6.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.21.mp4
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/6/3.mp4
6.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/21. Android SELinux.mp4
6.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/23. ThirdParty Application Location Artifacts 1.mp4
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/2.mp4
6.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/11. Threat Modeling in DevOps.mp4
6.1 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/36.mp4
6.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/27.webm
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/101.mp4
6.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/12.mp4
6.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/001-720.webm
6.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/001-720.webm
6.1 MB
SEC506 - Securing Linux-Unix/text/2019/506.4-5.pdf
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/11.mp4
6.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.2.mp4
6.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/14.mp4
6.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_3.webm
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/8.mp4
6.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/9. Basic Terminology SQLite Databases.mp4
6.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/4.mp4
6.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.16.mp4
6.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.15.mp4
6.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.1/SANS OnDemand5.webm
6.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/5. Putting Leadership into Perspective.mp4
6.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.68.mp4
6.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.73.mp4
6.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/023-720.webm
6.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.6.mp4
6.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/03.webm
6.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/02.webm
6.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_12.webm
6.1 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/9.mp4
6.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/3.mp4
6.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/10. Azure Front Door WAF.mp4
6.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/30.webm
6.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/8.webm
6.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/3.webm
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/15.mp4
6.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/007-720.webm
6.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/4. Active Directory Permissions and Delegation of Authority for Damage Containment/3.mp4
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/12.mp4
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/74.mp4
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/4.mp4
6.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/13.webm
6.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/22.webm
6.1 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/19.mp4
6.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/17. What Can You Normally Recover.mp4
6.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/6.webm
6.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/17.mp4
6.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/3. Android Forensics Agenda.mp4
6.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/17.mp4
6.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.1 Moving Files with Exploits/SEC560 - 4.1.6.mp4
6.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/30.mp4
6.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/093-720.webm
6.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/019-720.webm
6.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/027-720.webm
6.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/086-720.webm
6.1 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/8.mp4
6.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/13.mp4
6.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/004-720.webm
6.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/29. Frida CLI Loading Custom scripts.mp4
6.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/14.webm
6.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 1 - Hardening Unix-Linux Systems Part 1/Extra/GUI Logins.ogv
6.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/34. Distorted Perceptions.mp4
6.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.2 DOCUMENT OBJECT MODEL/SEC542- SANS OnDemand_4_2.webm
6.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/7.webm
6.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/5. Application Data datadata.mp4
6.0 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/006-720.webm
6.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/008-720_Getting_Started_with_Unpacking.webm
6.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/1. Static Application Analysis/4. Static Application Analysis.mp4
6.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/017-720.webm
6.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/01.webm
6.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/15. Thinning iOS Binaries.mp4
6.0 MB
SEC511 - Continuous Monitoring and Security Operations/text/2019/511.4.pdf
6.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.14.mp4
6.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/1. Static Application Analysis/5. Legality of Reverse Engineering.mp4
6.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/010-720.webm
6.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/018-720.webm
6.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/42.mp4
6.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/32.mp4
6.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/14.mp4
6.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_2.webm
6.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/6. iOS Application Interaction/2. iOS Legacy App IPC.mp4
6.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/34. Lab 21 Solution Group the Big Ideas.mp4
6.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/11.webm
6.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/7.mp4
6.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/2/1.mp4
6.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/32. Encrypted Backup.mp4
6.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.2 Pilfering from Target Machines/SEC560 - 4.2.2.mp4
6.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/7.mp4
6.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/006-720.webm
6.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/26.mp4
6.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.11 SUMMARY/SEC542- SANS OnDemand.webm
6.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/23.mp4
6.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/055-720.webm
6.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/023-720.webm
6.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/41.mp4
6.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/27.mp4
6.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/7. Enforcement Responsibilities Example.mp4
6.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/31.webm
6.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/08.webm
6.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/067-720.webm
6.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/28.webm
6.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_11.webm
6.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/004-720.webm
6.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/76.mp4
6.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/6.mp4
6.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/46. Types of Policies to Have in Your Organization.mp4
6.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/48. Course Roadmap 4.mp4
6.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/12. Technology and the Threat Landscape.mp4
6.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/5. Rvictl Sniffing.mp4
6.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.7 HTTP SYNTAX AND MESSAGING/SEC542- SANS OnDemand_7.webm
6.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/14.mp4
6.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/29.mp4
6.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/015-720_Recognizing_Packed_Malware.webm
5.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/6.mp4
5.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/8. Explore App Classes.mp4
5.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/013-720.webm
5.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/10. Microservices Security Challenges 2.mp4
5.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/36. Policies Should Encourage Employees to Behave Appropriately.mp4
5.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/6.mp4
5.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/19. Enterprise App Store Certificates.mp4
5.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/15.webm
5.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/13.mp4
5.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/14.webm
5.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.3.mp4
5.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/015-720.webm
5.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/15.mp4
5.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/018-720.webm
5.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/17.mp4
5.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/2.mp4
5.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/015-720.webm
5.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.18.mp4
5.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/19. Examples Using dumpsys 1.mp4
5.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/040-720.webm
5.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_3_2.webm
5.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/3. Containers vs VMs.mp4
5.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/39. CIS Controls.mp4
5.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/004-720.webm
5.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/2.webm
5.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/24.mp4
5.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/40.mp4
5.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/015-720.webm
5.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/010-720.webm
5.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/026-720_Code_Injection_API_Hooking.webm
5.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/29.webm
5.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/2.webm
5.9 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Shared Libraries.ogv
5.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/016-720.webm
5.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/10.mp4
5.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.4.mp4
5.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/026-720.webm
5.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/013-720_Malware_Memory_Forensics.webm
5.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/4. iOS Forensic Acquisition.mp4
5.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/17.mp4
5.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/3. Flow Control Conditional Testing and Loops/5.mp4
5.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/010-720.webm
5.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/018-720.webm
5.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/33.mp4
5.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/14.mp4
5.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/5.webm
5.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/013-720.webm
5.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/1.webm
5.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/31.mp4
5.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/020-720.webm
5.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.63.mp4
5.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/010-720.webm
5.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/004-720_Malware_Memory_Forensics.webm
5.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.25.mp4
5.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_04.webm
5.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/1.mp4
5.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/020-720.webm
5.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.9.mp4
5.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.1 INTRODUCTION TO AUTOMATED DEFENSE, FORENSICS AND OFFENSE/02.webm
5.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/05.webm
5.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/28.mp4
5.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/009-720.webm
5.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/22. Mobile Device Management MDM.mp4
5.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/22.mp4
5.8 MB
SEC540 - Cloud Security and DevOps Automation/text/2020/540.5.pdf
5.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2019/542.4.pdf
5.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.2.mp4
5.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/3.mp4
5.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_5_3.webm
5.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_3.webm
5.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/4. What Is Policy.mp4
5.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/012-720.webm
5.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_6.webm
5.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/6.mp4
5.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/11.mp4
5.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/7. Call Logs 2.mp4
5.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/19.webm
5.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/18.webm
5.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/22.mp4
5.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/7.webm
5.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/6.mp4
5.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.60.mp4
5.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_15_2.webm
5.8 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2019/660.5 - Exploiting Windows for Penetration Testers.pdf
5.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/5.webm
5.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/16. Media Card Encryption.mp4
5.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/64.mp4
5.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/2. Locked Android Devices/6. Verifying a Lock Setting 2.mp4
5.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/27. CodeBuild Phases.mp4
5.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/8.mp4
5.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/01.webm
5.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/13.mp4
5.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/21. SSL Pinning Bypass with Objection.mp4
5.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_14.webm
5.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/23.webm
5.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/32.mp4
5.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/003-720.webm
5.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/24. Lost Device Reporting.mp4
5.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/020-720.webm
5.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/024-720.webm
5.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/045-720.webm
5.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/029-720.webm
5.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/1.mp4
5.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/10.mp4
5.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/024-720.webm
5.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/4. iOS 11 SMS.mp4
5.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/2. Android Evidentiary Locations Overview.mp4
5.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.1 - Introduction to Alternative Web Interfaces/002-720.webm
5.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/10.mp4
5.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/007-720.webm
5.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/10.webm
5.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/020-720.webm
5.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/01.webm
5.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.12.mp4
5.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/17.webm
5.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/6.mp4
5.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/062-720.webm
5.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/21.mp4
5.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/3.mp4
5.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/002-720.webm
5.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2019/642.1.pdf
5.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/012-720.webm
5.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/003-720.webm
5.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/021-720.webm
5.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/18.webm
5.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/011-720.webm
5.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/003-720.webm
5.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/19. Impact on Maersk.mp4
5.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/025-720.webm
5.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/025-720 (1).webm
5.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/12. Host Systems.mp4
5.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/12. Sslstrip Interception.mp4
5.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.1 Moving Files with Exploits/SEC560 - 4.1.2.mp4
5.7 MB
SEC511 - Continuous Monitoring and Security Operations/text/2019/511.2.pdf
5.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/9.webm
5.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/14.webm
5.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/027-720.webm
5.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/027-720.webm
5.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_13.webm
5.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/12.webm
5.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/text/2020/564.2.pdf
5.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/2. Retrieving Android Apps.mp4
5.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/008-720.webm
5.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/11.webm
5.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/6.mp4
5.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/text/2019/575.5.pdf
5.7 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2019/SEC617.4 - Bluetooth and Software Defined Radio Attacks.pdf
5.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/6.webm
5.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/016-720.webm
5.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.19.mp4
5.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_05.webm
5.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/004-720.webm
5.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/15.mp4
5.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/21. YiSpecter Infection.mp4
5.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/007-720.webm
5.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/018-720.webm
5.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/11.mp4
5.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/22. Hunt the Bug Creating a Lambda Function.mp4
5.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.9.mp4
5.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/49. Effective Communications.mp4
5.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/9.mp4
5.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/14.webm
5.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.13.mp4
5.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/022-720.webm
5.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/009-720.webm
5.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/003-720.webm
5.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/004-720.webm
5.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_17.webm
5.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/6. iOS Apps 2.mp4
5.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/35. What Is PEST Analysis.mp4
5.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/6.mp4
5.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/17.mp4
5.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/19.mp4
5.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/005-720.webm
5.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/043-720.webm
5.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/008-720.webm
5.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/06.webm
5.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/6. Drozer Console Analysis.mp4
5.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/8.mp4
5.6 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/39.mp4
5.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/25.mp4
5.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/2. The SIFT Workstation/6. Labs and Lecture.mp4
5.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/17. Tip 3 Add Your Own Comments.mp4
5.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/1/7.mp4
5.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/6. Practical Tips to Succeed.mp4
5.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/1/3.mp4
5.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/16.webm
5.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/18.mp4
5.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/07.webm
5.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/3. The Apple Watch 1.mp4
5.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/16.mp4
5.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2019/642.2.pdf
5.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/77.mp4
5.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/008-720.webm
5.6 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/7.mp4
5.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/8. Potential ShortTerm Action Items.mp4
5.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/51. Risk Appetite Statement Example 1.mp4
5.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/4. Android Platform Releases.mp4
5.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/003-720.webm
5.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/8.mp4
5.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/1.webm
5.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/9. Dalvik Bytecode Types.mp4
5.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/10. Measures Metrics and Key Performance Indicators KPIs.mp4
5.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/13. Interesting Plist Files.mp4
5.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/14.mp4
5.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/5. Behavioral Economics.mp4
5.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/22. comappleidentityservicesidstatuscacheplist.mp4
5.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/19.mp4
5.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/11.webm
5.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/18.webm
5.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_10.webm
5.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_12.webm
5.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/002-720.webm
5.6 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/2.mp4
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/04.webm
5.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/025-720_Malware_Memory_Forensics.webm
5.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/005-720.webm
5.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/013-720.webm
5.5 MB
SEC545 - Cloud Security Architecture and Operations/text/2020/545.1.pdf
5.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/82. Define Roles and Responsibilities.mp4
5.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/37.mp4
5.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/003-720.webm
5.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/21. CALMS Lean at ING Group.mp4
5.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/6/1.mp4
5.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.75.mp4
5.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/19.mp4
5.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/25. CloudMapper.mp4
5.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/20. BetterCap Examples.mp4
5.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.9.mp4
5.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/3.webm
5.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/030-720.webm
5.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/030-720 (1).webm
5.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/6. Recovering Snapshots and Graphics.mp4
5.5 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/047-720.webm
5.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/7.mp4
5.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/19.mp4
5.5 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/004-720.webm
5.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/12.mp4
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/31.webm
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/15.webm
5.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/8. Overcoming Android Obfuscation.mp4
5.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/001-720.webm
5.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/13. Metric Selection Is Important.mp4
5.5 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/57.mp4
5.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/9.mp4
5.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/2.mp4
5.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/42.mp4
5.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.12.mp4
5.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/10.webm
5.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/041-720.webm
5.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/10.mp4
5.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2019/514.1.pdf
5.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/7. VERIS Threat Actors.mp4
5.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/14. Phone Call Log Access Restrictions Finally.mp4
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/17.webm
5.5 MB
SEC506 - Securing Linux-Unix/video/2011/Day 5 - Digital Forensics For Linux-Unix/Extra/fsstat.ogv
5.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/16. Sustaining vs Disruptive Innovation.mp4
5.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/9.mp4
5.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/16. Using the Metrics Hierarchy.mp4
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/06.webm
5.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/11. User Accounts and Passwords.mp4
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/01.webm
5.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/9.webm
5.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/6. Google Cloud Extractions and Analysis/3. Elcomsoft Cloud eXplorer 2.mp4
5.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/20. European Union GDPR Requirements.mp4
5.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/16.webm
5.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_13.webm
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/05.webm
5.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/22. Apple Maps 3 Protobuf Reality iOS 13.mp4
5.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.17.mp4
5.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/13.webm
5.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/20. Android Backup Access.mp4
5.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/17.mp4
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/12.webm
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.3 PROCESS EXECUTION/07.webm
5.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/06.webm
5.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/6. Serverless Security Concerns.mp4
5.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/6. What Was Missed.mp4
5.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.5.mp4
5.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/12. Android Ransomware Svpeng.mp4
5.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/4.mp4
5.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/5.mp4
5.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/003-720.webm
5.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_6.webm
5.4 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2019/SEC617.5 - RFID, Smart Cards, and NFC Hacking.pdf
5.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/18.mp4
5.4 MB
SEC505 - Securing Windows and PowerShell Automation/text/2020/505.2.pdf
5.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/44. Stakeholder Identification.mp4
5.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/007-720.webm
5.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/020-720.webm
5.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/9.mp4
5.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/16. Example commagnetforensicsacquire baseapk.mp4
5.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/2. Setting Up Systems Infrastructure.mp4
5.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/3.mp4
5.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/5.webm
5.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/6.mp4
5.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/16.webm
5.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/009-720.webm
5.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/4. Solid State Flash Memory Properties.mp4
5.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/14.webm
5.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/038-720.webm
5.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/09.webm
5.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/011-720.webm
5.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_10.webm
5.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/20. Focus on Android Suspicious apk Files.mp4
5.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/2. The SIFT Workstation/3. Programs Installed.mp4
5.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/19.mp4
5.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/21.mp4
5.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/text/2020/564.1.pdf
5.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/24.mp4
5.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/10. How the Course Works.mp4
5.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/3.webm
5.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/20.webm
5.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/033-720.webm
5.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.8/004-720.webm
5.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/39. Docker Alternatives MicroVMs and Kernel Sandboxes.mp4
5.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.3.mp4
5.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/21. AWS Deployment Overview.mp4
5.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_12.webm
5.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/027-720.webm
5.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/24.webm
5.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/13.webm
5.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/22.webm
5.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2019/642.4.pdf
5.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/11.webm
5.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/24.mp4
5.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/19. SMART Exercise 4.mp4
5.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/39.webm
5.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/38.mp4
5.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/11.webm
5.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/22. Can the Presence of Malware Actually Assist in an Investigation.mp4
5.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/003-720.webm
5.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/5.mp4
5.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/20.webm
5.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/5.webm
5.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/15.mp4
5.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/9.mp4
5.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/11.mp4
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/19.webm
5.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/16.mp4
5.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/15.mp4
5.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/66.mp4
5.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/11.webm
5.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/20.mp4
5.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/002-720.webm
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/18.webm
5.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/14. Twelve Ways to Win People to Your Way of Thinking 1.mp4
5.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/7.mp4
5.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/02.webm
5.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/14.mp4
5.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_13.webm
5.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/18.mp4
5.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/16. Creating a Match Condition CSRF.mp4
5.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/4. Course Roadmap 2.mp4
5.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/7.mp4
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/12.webm
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/20.webm
5.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/11.webm
5.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/13. Accessibility Features Abuse Cloak Dagger Attack.mp4
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/21.webm
5.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/19.mp4
5.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/25. NIST Cybersecurity Framework CSF.mp4
5.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/23.mp4
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/31.webm
5.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/3. Android File System Structures/4. File System Data Obtained.mp4
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/5.webm
5.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/8. Wireshark Navigation.mp4
5.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/20. Course Roadmap 2.mp4
5.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/22. Apple Pay.mp4
5.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/011-720.webm
5.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/03.webm
5.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/16. SMART Exercise 1.mp4
5.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/08.webm
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/15.webm
5.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/13.mp4
5.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.9.mp4
5.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/9. Metasploit MainActivity Implant.mp4
5.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/6.mp4
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/11.webm
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/7.webm
5.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/07.webm
5.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/005-720.webm
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/25.webm
5.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/13.mp4
5.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/023-720.webm
5.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/16.mp4
5.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/010-720.webm
5.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/47. Risk Appetite Statement RAS.mp4
5.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/011-720.webm
5.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/8.mp4
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/9.webm
5.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/4. iOS Operating System Security.mp4
5.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/8.mp4
5.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/05.webm
5.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_2_2.webm
5.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/33. Applications Developed in Kotlin Slightly Different LookFeel.mp4
5.3 MB
SEC540 - Cloud Security and DevOps Automation/text/2020/540.4.pdf
5.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/4.mp4
5.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.5 Bootcamp - researching protocols/006-720.webm
5.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/003-720.webm
5.3 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/040-720.webm
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/6.webm
5.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/1.mp4
5.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.1 Introduction Network Security Essentials/2.webm
5.3 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/24.mp4
5.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/108.mp4
5.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2019/542.2.pdf
5.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/16. Why Is This So Important.mp4
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/16.webm
5.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/007-720.webm
5.2 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/002-720.webm
5.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_2.webm
5.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/7.mp4
5.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/11.mp4
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/30.webm
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/06.webm
5.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/39.mp4
5.2 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2019/660.4 - Exploiting Linux for Penetration Testers.pdf
5.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/1. Dynamic Mobile Application Analysis and Manipulation/4. Dynamic Mobile Application Analysis.mp4
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/03.webm
5.2 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/005-720.webm
5.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/12. Module Summary.mp4
5.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/2.mp4
5.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/5.mp4
5.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/15.webm
5.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/12.webm
5.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/8.mp4
5.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/59. ATTCK Matrix for Enterprise.mp4
5.2 MB
SEC545 - Cloud Security Architecture and Operations/text/2020/545.2.pdf
5.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/013-720.webm
5.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/009-720.webm
5.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.1 - Introduction to Web Frameworks/001-720.webm
5.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/29.mp4
5.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/14.mp4
5.2 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/028-720.webm
5.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/025-720.webm
5.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/4.webm
5.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.6.mp4
5.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/20.webm
5.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/071-720.webm
5.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/40.mp4
5.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/015-720.webm
5.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/27.webm
5.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/4.mp4
5.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.8.mp4
5.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/11.mp4
5.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/19.mp4
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/02.webm
5.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/13. Did the Application Ever Exist.mp4
5.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/8.mp4
5.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/008-720.webm
5.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/16. Attack Tools.mp4
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/24.webm
5.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/005-720.webm
5.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/18. AWS Lambda Layers.mp4
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/14.webm
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/09.webm
5.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/13.mp4
5.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/005-720.webm
5.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/16.mp4
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/13.webm
5.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/005-720.webm
5.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/5.mp4
5.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/10.mp4
5.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/text/2019/575.3.pdf
5.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/13.webm
5.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/7.mp4
5.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/text/2019/575.2.pdf
5.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_20.webm
5.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/7.mp4
5.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/23.webm
5.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/11.mp4
5.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/17. Production Monitoring at Etsy.mp4
5.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/08.webm
5.2 MB
SEC505 - Securing Windows and PowerShell Automation/text/2020/505.3.pdf
5.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/56.mp4
5.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/9.mp4
5.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/5. Android Operating System Security.mp4
5.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/047-720.webm
5.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/6. Locate the Databases of Interest iOS.mp4
5.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.1 INTRODUCTION TO AUTOMATED DEFENSE, FORENSICS AND OFFENSE/04.webm
5.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/013-720.webm
5.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/6. iPremier Company Culture.mp4
5.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/14.mp4
5.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/39.mp4
5.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/39.webm
5.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/10.mp4
5.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/15. Twelve Ways to Win People to Your Way of Thinking 2.mp4
5.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/07.webm
5.1 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2019/SEC617.2 - WiFi Attack and Exploitation Techniques.pdf
5.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/15. Innovation.mp4
5.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/3.mp4
5.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/08.webm
5.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/27.mp4
5.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/52. Tips for Creating Value Statements.mp4
5.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/014-720.webm
5.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/018-720.webm
5.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_05.webm
5.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/026-720.webm
5.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/4/3.mp4
5.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/2. How to Develop the Plan.mp4
5.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/24.mp4
5.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/10. File Carving/6.mp4
5.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/087-720.webm
5.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2019/542.5.pdf
5.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/1. Course Roadmap 1.mp4
5.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_6.webm
5.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/23.webm
5.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/010-720.webm
5.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/059-720.webm
5.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/09.webm
5.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/67. Approaches to Building a Security Business Case 1.mp4
5.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/014-720.webm
5.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/26.webm
5.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/31.mp4
5.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.8.mp4
5.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.3 TUPLES/02.webm
5.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/14.mp4
5.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/8.mp4
5.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/014-720.webm
5.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/3.mp4
5.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/53. Positive Voicing Examples.mp4
5.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/20. HCL Basics Input Variables.mp4
5.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/022-720.webm
5.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/20.mp4
5.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/010-720.webm
5.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/17.mp4
5.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/19. classdump Header Detail.mp4
5.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/15.mp4
5.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/016-720.webm
5.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/088-720.webm
5.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/003-720.webm
5.1 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/16.mp4
5.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_11.webm
5.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/012-720.webm
5.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/31. Frida Inspecting Return Values.mp4
5.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/007-720.webm
5.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/8. Acquisition Overview UFED Physical Analyzer 2.mp4
5.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/48. Goal for Your Board Meeting.mp4
5.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.20.mp4
5.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/35. CloudFormation Resource Tags.mp4
5.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/10.mp4
5.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/13.mp4
5.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/2.mp4
5.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/003-720.webm
5.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/2.mp4
5.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/5. So How Did They Do That.mp4
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/17.webm
5.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/54. What Values Should Your Security Department Have.mp4
5.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/05.webm
5.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/014-720.webm
5.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/6. iOS Application Interaction/3. Multiple URL Handler Registrants.mp4
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/6.webm
5.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/07.webm
5.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/13.mp4
5.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/014-720.webm
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/24.webm
5.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/10.mp4
5.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/25.mp4
5.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/48. Values and Culture.mp4
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/11.webm
5.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/018-720.webm
5.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/13.mp4
5.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/11.mp4
5.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/19.mp4
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/41.webm
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/15.webm
5.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/5. What Is ADB.mp4
5.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/005-720_Recognizing_Packed_Malware.webm
5.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/3. iPremier Read Case A.mp4
5.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/029-720.webm
5.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/005-720.webm
5.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/006-720.webm
5.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.23.mp4
5.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/24.mp4
5.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/33.webm
5.0 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/Automount Illustrated.ogv
5.0 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/14.mp4
5.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/011-720.webm
5.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/002-720.webm
5.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/19. Gemba Board at a Glance 1.mp4
5.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/2.mp4
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/21.webm
5.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/15.mp4
5.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/23.mp4
5.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/024-720_Malware_Memory_Forensics.webm
5.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/04.webm
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/29.webm
5.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/04.webm
5.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/003-720.webm
5.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/4. Ninja Slider Strings.mp4
5.0 MB
MGT414 - SANS Training Program for CISSP Certification/text/2019/414.3.pdf
5.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/11.webm
5.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/77. BSIMM Maturity Comparison Example.mp4
5.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/8.mp4
5.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_10_2.webm
5.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.98.mp4
5.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.15.mp4
5.0 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/27.mp4
5.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/015-720.webm
5.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/004-720.webm
5.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/8. iOS ASLR.mp4
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/1.webm
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/58.webm
5.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/05.webm
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/5.webm
5.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/9.mp4
5.0 MB
SEC573 - Automating Information Security with Python/text/2020/573.1-2.pdf
5.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/24.mp4
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/21.webm
5.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/4. The Stolen Device Threat.mp4
5.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/23.mp4
5.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/005-720.webm
5.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/18. Health More than Exercise.mp4
5.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/5.mp4
5.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/19.mp4
5.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/06.webm
5.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/9. The Secure Browser Difference Making Use of Cookies.mp4
5.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/039-720.webm
5.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/4.mp4
5.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/20.mp4
5.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/17.mp4
5.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/6.webm
5.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/021-720.webm
5.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.8.mp4
5.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/35. Secret Keepers Using Vault.mp4
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/36.webm
4.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/50. Risk Threshold Example.mp4
4.9 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/11.mp4
4.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/020-720.webm
4.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/2. Siri.mp4
4.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/3. Course Roadmap 2.mp4
4.9 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/009-720.webm
4.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.9.mp4
4.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/3.mp4
4.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/8.mp4
4.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/016-720.webm
4.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/3. Course Roadmap 1.mp4
4.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/010-720.webm
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/13.webm
4.9 MB
SEC545 - Cloud Security Architecture and Operations/text/2020/545.5.pdf
4.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/01.webm
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/8.webm
4.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.1 WHY THE WEB/SEC542- SANS OnDemand_5.webm
4.9 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2019/SEC617.3 - Enterprise WiFi, DECT, and ZigBee Attacks.pdf
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/29.webm
4.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.2.mp4
4.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/5. Purpose of Policy.mp4
4.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/70.mp4
4.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/003-720.webm
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/26.webm
4.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/017-720.webm
4.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/017-720 (1).webm
4.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/016-720.webm
4.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/013-720.webm
4.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/8. Whats the Difference Between Secure and Anonymous.mp4
4.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/28.mp4
4.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/9.mp4
4.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/030-720.webm
4.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/5. Serverless Security Benefits.mp4
4.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.6 FUZZING/SEC542- SANS OnDemand_5_2.webm
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/9.webm
4.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/019-720.webm
4.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/27.mp4
4.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_3_3.webm
4.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/15. Logical Remnants Left Behind Access via ADB.mp4
4.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/16.mp4
4.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/2.mp4
4.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/21. Lab 41 BlueGreen Deploy for Security.mp4
4.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.6 FUZZING/SEC542- SANS OnDemand_2_2.webm
4.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/011-720.webm
4.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/7.mp4
4.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/13. Infoplist Examination.mp4
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/28.webm
4.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_06.webm
4.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/6.mp4
4.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/004-720.webm
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/1.webm
4.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.8.mp4
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/2.webm
4.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/35. Step 2 Mapping Power and Interest Example.mp4
4.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/008-720.webm
4.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/9. CloudTrail.mp4
4.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/13.webm
4.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/026-720_Malware_Memory_Forensics.webm
4.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/015-720.webm
4.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/8.mp4
4.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/010-720.webm
4.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/17.mp4
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/25.webm
4.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/9.mp4
4.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/043-720.webm
4.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.3 BloodHound/SEC560 - 5.3.3.mp4
4.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/11.mp4
4.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/38.webm
4.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/32.webm
4.8 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/5.mp4
4.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/27.mp4
4.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.5.mp4
4.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/021-720_Malware_Memory_Forensics.webm
4.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/08.webm
4.8 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2019/660.3 - Python, Scapy, and Fuzzing.pdf
4.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/6.mp4
4.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/012-720.webm
4.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/19. Mobile Malware and Spyware Examination Tips.mp4
4.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/3. Android File System Structures/5. Logical File SystemBackup Layout.mp4
4.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/27. Lab 21 Creating a Mission Statement 1.mp4
4.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.8/008-720.webm
4.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/89.mp4
4.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/7. Recovering Attachments Located by FilenamePath.mp4
4.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/12.mp4
4.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/015-720.webm
4.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/8.mp4
4.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/23.webm
4.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.48.mp4
4.8 MB
SEC505 - Securing Windows and PowerShell Automation/text/2020/505.1.pdf
4.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.4.mp4
4.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/10.mp4
4.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/08.webm
4.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/23.mp4
4.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/01.webm
4.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/4. Filters to Communication.mp4
4.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/62. Infographic Example.mp4
4.8 MB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/016-720.webm
4.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/2. Leading Change.mp4
4.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/1/2.mp4
4.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/15. Multimedia Does the User Know Its There.mp4
4.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/25.mp4
4.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/37.mp4
4.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/8. Did the Tool Really Decode the Application.mp4
4.8 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/5.mp4
4.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/7. AWS Security Hub.mp4
4.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/16.mp4
4.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/9.mp4
4.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/027-720.webm
4.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/10. Method 1 Always Off Rule for Smartphone Collection.mp4
4.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/005-720.webm
4.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/2. DevOps and Compliance.mp4
4.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/9.mp4
4.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/16. United States HIPAA.mp4
4.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.10.mp4
4.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/007-720.webm
4.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.5 Bootcamp - researching protocols/004-720.webm
4.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/7. NetWars Scoring.mp4
4.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_3_2.webm
4.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/096-720.webm
4.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/011-720.webm
4.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/26.mp4
4.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/21.mp4
4.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/20. Scope Example Brown University.mp4
4.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/01.webm
4.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/text/2019/575.4.pdf
4.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/10.mp4
4.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/017-720.webm
4.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/1.mp4
4.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/018-720.webm
4.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/1.webm
4.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/19.mp4
4.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_5.webm
4.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/21.mp4
4.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/13. iOS Contacts Access.mp4
4.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/23.webm
4.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/33.mp4
4.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.5.mp4
4.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/22. APK Manipulation for AV Evasion.mp4
4.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/012-720.webm
4.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/009-720.webm
4.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/30.webm
4.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/10. Dalvik Common Instructions.mp4
4.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/06_2.webm
4.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/010-720.webm
4.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/29. Preference Files of Interest.mp4
4.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/18.mp4
4.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/003-720.webm
4.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/019-720.webm
4.7 MB
SEC201 - Computing & Technology Essentials/text/2017/SEC201_5_C01_01.pptx
4.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/25. SQL Injection Flaws.mp4
4.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/007-720.webm
4.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/09.webm
4.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/13.mp4
4.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/4. Unpacking Unity.mp4
4.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/22.webm
4.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/11. TOR Browsers.mp4
4.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/11.webm
4.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/073-720.webm
4.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/013-720.webm
4.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/16. CALMS Culture at Netflix.mp4
4.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/47.webm
4.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/03.webm
4.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/16. Retail Industry Mission 1.mp4
4.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/27.webm
4.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/20. Simple CORS Example.mp4
4.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/4. The Apple Watch 2.mp4
4.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/010-720.webm
4.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/014-720_Malware_Memory_Forensics.webm
4.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/025-720.webm
4.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/9. iOS and Data Storage.mp4
4.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/006-720.webm
4.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/23.mp4
4.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/39.webm
4.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/43. Social Examples.mp4
4.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/17.mp4
4.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/001-720.webm
4.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/007-720.webm
4.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/016-720.webm
4.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/11.webm
4.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/32.mp4
4.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_7.webm
4.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/044-720_Analyzing_Multi-Technology_Malware.webm
4.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/17.webm
4.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/09.webm
4.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_4_2.webm
4.7 MB
SEC505 - Securing Windows and PowerShell Automation/text/2020/505.6.pdf
4.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.9 John the Ripper/SEC560 - 4.9.4.mp4
4.7 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/17.mp4
4.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.24.mp4
4.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/13. Realistic 2.mp4
4.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/12.webm
4.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/19.webm
4.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/14.mp4
4.7 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/8. Data Stream Carving/4.mp4
4.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/24.mp4
4.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/51.webm
4.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/27.mp4
4.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.76.mp4
4.7 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/052-720.webm
4.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_8_2.webm
4.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/006-720.webm
4.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/8.webm
4.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.2.mp4
4.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/4. Android App Manipulation.mp4
4.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/11. notificationlogdb.mp4
4.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/6. What Happens When History Is Cleared.mp4
4.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/7. Cloud Access Methods.mp4
4.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/4.mp4
4.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/36.mp4
4.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/009-720.webm
4.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/019-720.webm
4.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/02.webm
4.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_17.webm
4.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/01.webm
4.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/002-720.webm
4.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/19.webm
4.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/011-720.webm
4.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/34.mp4
4.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.10.mp4
4.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/003-720.webm
4.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/67.mp4
4.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/23. Grocery Store Example.mp4
4.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/7.mp4
4.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/041-720.webm
4.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/20. iPremier Read Case C.mp4
4.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/57. Risk Landscape.mp4
4.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.6.mp4
4.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/004-720.webm
4.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/19. Course Roadmap 3.mp4
4.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/2.mp4
4.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/23. China Cybersecurity Law.mp4
4.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/017-720.webm
4.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/27. Microservice Security Service Mutual TLS Authentication.mp4
4.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/1. Course Roadmap.mp4
4.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/10.mp4
4.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/4.mp4
4.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/26.webm
4.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/07.webm
4.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/1.mp4
4.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/14.webm
4.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_07.webm
4.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/4. Socialize the Approved Policy.mp4
4.6 MB
SEC506 - Securing Linux-Unix/text/2019/506.6.pdf
4.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/010-720.webm
4.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/11.webm
4.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.27.mp4
4.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/9.mp4
4.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/007-720.webm
4.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/024-720.webm
4.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/12. Use of Questions to Get Needed Information.mp4
4.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_12.webm
4.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2019/514.4.pdf
4.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.22.mp4
4.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/005-720.webm
4.6 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/6.mp4
4.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/002-720.webm
4.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/007-720_Recognizing_Packed_Malware.webm
4.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/13. Discord Example No Database No Problem.mp4
4.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/005-720.webm
4.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.9.mp4
4.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/31.mp4
4.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/7. Did the Tool Miss the Results of an Upgrade.mp4
4.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/23. Strategic Communications.mp4
4.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/012-720.webm
4.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/4.webm
4.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/4. ThirdParty Application Analysis 2.mp4
4.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/33.mp4
4.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/094-720.webm
4.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/1.webm
4.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/6.mp4
4.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/009-720.webm
4.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/11.mp4
4.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/004-720.webm
4.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/004-720.webm
4.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/003-720.webm
4.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/015-720_Code_Injection_API_Hooking.webm
4.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_01.webm
4.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/11.webm
4.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/014-720.webm
4.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/18.mp4
4.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/12. Embedded Plist Data.mp4
4.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/30.webm
4.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/004-720.webm
4.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/8.mp4
4.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/18.webm
4.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/5. USERDATA Evidentiary Locations.mp4
4.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.10.mp4
4.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/13. Reporting/2.mp4
4.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/14. Course Roadmap 2.mp4
4.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/030-720.webm
4.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/005-720.webm
4.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.13.mp4
4.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/003-720_Malware_Memory_Forensics.webm
4.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/14.mp4
4.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/6. Example XcodeGhost iOS.mp4
4.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/8.mp4
4.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/024-720.webm
4.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.8/005-720.webm
4.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/8. Multimedia Files.mp4
4.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.1 INTRODUCTION TO AUTOMATED DEFENSE, FORENSICS AND OFFENSE/03.webm
4.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/07.webm
4.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/3. Azure Security Center.mp4
4.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/003-720.webm
4.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/01.webm
4.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/6.webm
4.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/6.webm
4.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/004-720.webm
4.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/02.webm
4.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/17.mp4
4.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/9.mp4
4.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/5. Jadx.mp4
4.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/20. PureSec FunctionShield.mp4
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/18. Alternative Storage Formats JSON Files.mp4
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/27. Mobile Safari Be Ready for Differences Pre iOS 13.mp4
4.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/26.webm
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/7. Android Forensics Overview/2. Android Basics.mp4
4.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.3 Motivation and Definitions/SEC560 - 4.3.2.mp4
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/2. Call Logs Contacts and Messages.mp4
4.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_07.webm
4.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/2/5.mp4
4.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/009-720.webm
4.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/9.mp4
4.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/11.webm
4.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/33. NACL Rules Public and Private Subnet.mp4
4.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/13.mp4
4.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/07.webm
4.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/061-720.webm
4.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/5.mp4
4.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/009-720.webm
4.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/14.mp4
4.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/8.webm
4.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/007-720.webm
4.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/30.webm
4.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/61. Market and Communicate to Customers.mp4
4.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/7.mp4
4.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/027-720.webm
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/12. Carrier Family Monitoring Tools.mp4
4.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/10.mp4
4.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/6. Android Apps.mp4
4.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/013-720.webm
4.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/009-720.webm
4.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/17.mp4
4.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/02.webm
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/5. Elcomsoft Attacks 1.mp4
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/34. What Should You Be Examining Inside the Application.mp4
4.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/3.mp4
4.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/10.webm
4.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/002-720.webm
4.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/16. Container Security User Namespacing.mp4
4.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/42. Types of Risk Assessments.mp4
4.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/003-720.webm
4.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/2.mp4
4.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/5. Configuration Management Puppet.mp4
4.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/002-720.webm
4.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/8.webm
4.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/016-720.webm
4.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/10.webm
4.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/6.webm
4.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/9. iPhone XS Pointer authentication codes.mp4
4.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/16.mp4
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/18. Was the Device in Use.mp4
4.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.10.mp4
4.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/005-720.webm
4.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.13.mp4
4.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/2.mp4
4.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/024-720.webm
4.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/035-720.webm
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/7. ADB Getting Connected 2.mp4
4.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/5.mp4
4.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/22.mp4
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/17. What if NOTHING Seems to Work.mp4
4.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/004-720.webm
4.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/4. localappstatedb.mp4
4.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/6.mp4
4.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/9.mp4
4.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/47. Board of Directors Concerns.mp4
4.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/5. Current State of DevOps.mp4
4.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/14. Lab Exercise Menus.mp4
4.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/025-720.webm
4.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/18.mp4
4.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/027-720.webm
4.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/03.webm
4.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/22.mp4
4.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/037-720.webm
4.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/004-720.webm
4.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/008-720.webm
4.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/11.webm
4.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.24.mp4
4.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/7. iPremier Immature Operations.mp4
4.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/4. iptables.mp4
4.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.8/006-720.webm
4.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/14.webm
4.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/49.mp4
4.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/019-720.webm
4.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/031-720.webm
4.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/12. NetworkMiner Images and Files.mp4
4.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/23. Lab 42 CloudFront Content Protection.mp4
4.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/8. Android Backups/5. adb Backup.mp4
4.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.2.mp4
4.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/18.mp4
4.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/14.mp4
4.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.1/SANS OnDemand4.webm
4.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/19.mp4
4.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/6. Managing Containers Orchestrator Security Risks.mp4
4.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/34.mp4
4.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/33.mp4
4.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/8. Security Testing in Continuous Integration CI.mp4
4.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/25.mp4
4.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/10.webm
4.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/003-720.webm
4.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_06.webm
4.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/18. Policy Assessment 3.mp4
4.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/16.webm
4.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/9.webm
4.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/010-720.webm
4.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/11. Refresher on SQLite Query Language.mp4
4.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/text/2019/575.1.pdf
4.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/24.mp4
4.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/11.mp4
4.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/013-720.webm
4.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/3. Broken Access Control.mp4
4.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/28.mp4
4.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/3.mp4
4.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/009-720.webm
4.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/18.webm
4.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/6. iOS Application Interaction/6. Chrome URL Handler Vulnerability.mp4
4.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/7.mp4
4.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/010-720.webm
4.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/03.webm
4.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/2.mp4
4.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/008-720.webm
4.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/4. Microservices.mp4
4.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/016-720.webm
4.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/11.webm
4.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_12.webm
4.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_08.webm
4.4 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/17.mp4
4.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/02.webm
4.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/31. Counseling Tips.mp4
4.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_07.webm
4.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/10.webm
4.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/07.webm
4.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/08.webm
4.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.5.mp4
4.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2019/542.3.pdf
4.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/016-720.webm
4.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/009-720.webm
4.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/43.webm
4.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/27.mp4
4.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/008-720.webm
4.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/002-720_Using_Debuggers_for_Dumping.webm
4.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.3.mp4
4.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.28.mp4
4.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/10.mp4
4.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/003-720.webm
4.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/28.mp4
4.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/29.mp4
4.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/17.webm
4.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/009-720.webm
4.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_4_2.webm
4.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/008-720.webm
4.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/004-720.webm
4.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/28. SQLiteSpy.mp4
4.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/6.webm
4.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/1.webm
4.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/8.webm
4.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/038-720.webm
4.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/017-720.webm
4.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/018-720.webm
4.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.5 - Crypto Exploit Concepts/007-720.webm
4.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/14.mp4
4.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/10.mp4
4.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/010-720.webm
4.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/22.mp4
4.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/5. Finding Geolocation Data Show Me What You Can Analyze.mp4
4.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/11. When to Use Signed URLs vs Signed Cookies.mp4
4.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/3.mp4
4.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.11-Summary/SEC542- SANS OnDemand.webm
4.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/28.mp4
4.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/05.webm
4.3 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/028-720.webm
4.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/15. How the WAL Gets Populated New Page Is Written.mp4
4.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/16. Tip 2 Use Complex Types.mp4
4.3 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/014-720.webm
4.3 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.2 - Crypto and Post-Exploitation/2.7 Appendix A. Powershell Essentials.mkv
4.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/13. Enter HSTS.mp4
4.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/2.mp4
4.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/22.mp4
4.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/024-720.webm
4.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/17.webm
4.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/06_2.webm
4.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/010-720.webm
4.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/7. Physical Analyzer Key Features.mp4
4.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/11.mp4
4.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/30.mp4
4.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/9.mp4
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/9.mp4
4.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/56. Component Management Fewer Better Suppliers.mp4
4.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/13.webm
4.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/043-720.webm
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/3.mp4
4.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/14. Statusplist Examination.mp4
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/22.mp4
4.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/15.mp4
4.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/006-720.webm
4.3 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/015-720.webm
4.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_16.webm
4.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.9.mp4
4.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/6. Google Cloud Extractions and Analysis/5. Elcomsoft Cloud eXplorer NOT Just for Android Users.mp4
4.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/013-720.webm
4.3 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/017-720.webm
4.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/26.webm
4.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/013-720.webm
4.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/31.mp4
4.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/10. Interpreting Search Hits.mp4
4.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/39.mp4
4.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/17. SMART Exercise 2.mp4
4.3 MB
MGT414 - SANS Training Program for CISSP Certification/text/2019/414.1.pdf
4.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/29.webm
4.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/1. Introduction to Device Architecture and Common Mobile Threats/3. Course Exercises.mp4
4.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/7.mp4
4.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/30.mp4
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/23.mp4
4.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/001-720 (2).webm
4.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/002-720_Debugging_Packed_Malware.webm
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/9.mp4
4.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/19. Did I Use the Correct JOIN.mp4
4.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/012-720.webm
4.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/8. Smartphone Handling.mp4
4.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.5.mp4
4.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2019/514.3.pdf
4.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/38. Hunt the Bug Instance Launch Configuration.mp4
4.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/3. Walls of Confusion.mp4
4.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/012-720.webm
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/5.mp4
4.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/003-720.webm
4.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/10. Container Security Advantages.mp4
4.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2019/642.5.pdf
4.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/019-720.webm
4.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/15.mp4
4.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/8. Contextlog0db Samsung Devices OS 7.mp4
4.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/034-720.webm
4.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/21.mp4
4.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/4. Managing Containers Orchestrators.mp4
4.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/8.mp4
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/5.mp4
4.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/11. Objection Bypassing Security Controls.mp4
4.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/52.mp4
4.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/14.webm
4.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/50. Making Ideas Stick.mp4
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/25.mp4
4.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.1 Introduction Cryptography and Risk Management/2.webm
4.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/012-720.webm
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/4.mp4
4.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/34.webm
4.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/31.mp4
4.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/1. iOS Forensics Overview/4. iOS Basics.mp4
4.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/015-720.webm
4.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/06_2.webm
4.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/11.webm
4.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/12.mp4
4.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_04.webm
4.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/4.webm
4.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/006-720.webm
4.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/24. Office365 Case Scenario.mp4
4.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/25.mp4
4.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/039-720.webm
4.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.3.mp4
4.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/4.webm
4.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/06.webm
4.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/030-720.webm
4.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/047-720.webm
4.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/003-720.webm
4.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/18.mp4
4.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/37.mp4
4.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/34.webm
4.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/4. DevOps Audit Defense Toolkit Policy Definition.mp4
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/005-720.webm
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/11.mp4
4.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/05.webm
4.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.1 Introduction Threat Management/1.webm
4.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/48. Levels of Policy.mp4
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/004-720.webm
4.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/43. Static Analysis Getting Value from Your Tools.mp4
4.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/028-720.webm
4.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/41. Executive Knowledge about Cybersecurity.mp4
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/10.mp4
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/046-720.webm
4.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/21.webm
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/12.mp4
4.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/13. Data Analysis.mp4
4.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/002-720_Code_Injection_API_Hooking.webm
4.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/07.webm
4.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/13. Unlimited Skips.mp4
4.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.27.mp4
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/021-720.webm
4.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/31.webm
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/19.mp4
4.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_5_2.webm
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/024-720.webm
4.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/2. Unlocking Rooting and Jailbreaking.mp4
4.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/25.mp4
4.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/21. Virtual Private Cloud VPC.mp4
4.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/16.mp4
4.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/25.webm
4.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/24.webm
4.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/7.mp4
4.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/15. Why We Need a Stakeholder Management Strategy 1.mp4
4.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/24. Define CodePipeline Stages.mp4
4.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/22.webm
4.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/14. Winning Organizational Trust and Confidence.mp4
4.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/17. What Are Stakeholders and Why Are They Important to Me.mp4
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/4.mp4
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/1.mp4
4.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/5.webm
4.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/27. Treble Hardware Abstraction Layer.mp4
4.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.15.mp4
4.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.8/003-720.webm
4.2 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/3. Collecting User Information/2.mp4
4.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.25.mp4
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/006-720.webm
4.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/009-720.webm
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/14.mp4
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.5 Bootcamp - researching protocols/005-720.webm
4.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/98.mp4
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/104-720.webm
4.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.11.mp4
4.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/013-720.webm
4.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/020-720_Analyzing_Multi-Technology_Malware.webm
4.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/11.mp4
4.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/12.webm
4.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/022-720.webm
4.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/3. Threats We Actually Care About 1.mp4
4.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/8. GrayKey by Grayshift.mp4
4.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/11.webm
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/4.mp4
4.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/19.mp4
4.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/21. Penetration Testing and DAST Scanning in the Cloud.mp4
4.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/20.mp4
4.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/018-720.webm
4.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/53. Intrusion Kill Chain 2.mp4
4.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/1. Cloud Infrastructure and Orchestration.mp4
4.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/107.mp4
4.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/6.mp4
4.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/28. iOS 13 Safari.mp4
4.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/26.mp4
4.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/26. Initial Compromise.mp4
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/15.mp4
4.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/010-720.webm
4.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/002-720.webm
4.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/002-720.webm
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/009-720.webm
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/17.mp4
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/8.mp4
4.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/010-720.webm
4.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/50. Course Roadmap 6.mp4
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/5.mp4
4.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/049-720.webm
4.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/16.mp4
4.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/5. Drozer Console Startup and Enumeration.mp4
4.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/017-720.webm
4.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/4.webm
4.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/010-720.webm
4.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/10. Trend Mobile RansomwareCrypto Malware.mp4
4.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/004-720.webm
4.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/6.mp4
4.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/9. Drozer Console Populated Intent.mp4
4.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/4. Azure Vulnerability Assessment.mp4
4.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/003-720.webm
4.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_12.webm
4.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/7.mp4
4.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/10. Mobile Device Browsers.mp4
4.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/13.webm
4.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/23. Approach to Breach Communications.mp4
4.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/7. Dalvik Bytecode.mp4
4.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/3. Network Capture.mp4
4.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/16.webm
4.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.43.mp4
4.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/6.mp4
4.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/015-720.webm
4.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.17.mp4
4.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/05.webm
4.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_10.webm
4.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/6. Career Opportunity.mp4
4.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/11.mp4
4.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/007-720.webm
4.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/16.mp4
4.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/027-720.webm
4.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/19. comapplewifiplist.mp4
4.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/15. Todays Reality When You Are NOT Rooted or Jailbroken.mp4
4.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/014-720.webm
4.1 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/28.mp4
4.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/4. The DevOps Solution.mp4
4.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_4.webm
4.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/015-720.webm
4.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/4. Be Especially Careful with GitHub.mp4
4.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/25. Vendors and Third Parties.mp4
4.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/10.mp4
4.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/012-720.webm
4.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/6.mp4
4.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/13.mp4
4.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/006-720.webm
4.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/10.mp4
4.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/16.mp4
4.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/3. SQL Injection Example.mp4
4.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/002-720.webm
4.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/14.webm
4.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/06.webm
4.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.7 HTTP SYNTAX AND MESSAGING/SEC542- SANS OnDemand_5_3.webm
4.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/025-720.webm
4.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_9_2.webm
4.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/1. Introduction and Information/5.mp4
4.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.17.mp4
4.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/20.webm
4.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/10.mp4
4.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/33.mp4
4.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/2.mp4
4.1 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/3.mp4
4.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/5.mp4
4.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/5. Handling Locked iOS Devices/4. Lockdown SuccessFailures.mp4
4.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_5_3.webm
4.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/31.webm
4.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/003-720.webm
4.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/106-720.webm
4.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/25.webm
4.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/2. Monolith Architecture Attack Surface.mp4
4.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/20.mp4
4.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/17. Mobile Malware Detection.mp4
4.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/18. Not All Tools Are Equal Not All Smartphones Are Equal.mp4
4.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/6.webm
4.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/3.webm
4.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/15.mp4
4.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.1 INTRODUCTION TO ESSENTIAL SKILLS WORKSHOP/02.webm
4.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/013-720.webm
4.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/25.mp4
4.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/021-720.webm
4.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/24. Case Study Continuous Red Team Fire Drills at Intuit.mp4
4.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/22. Interactive Application Security Testing IAST.mp4
4.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/13. Docker Authentication and Authorization.mp4
4.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/006-720.webm
4.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/13. Course Roadmap 2.mp4
4.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/6. Examining Usagestats for Presence of Deleted Applications.mp4
4.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/28. Metrics Visualization Considerations.mp4
4.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/02.webm
4.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.1 INTRODUCTION TO ESSENTIAL SKILLS WORKSHOP/03.webm
4.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/5.mp4
4.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/7. Example Bootrom Exploit checkm8 iOS.mp4
4.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/85.mp4
4.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.8.mp4
4.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/13. Thinking Versus Knowing What Employees Want in a Job.mp4
4.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/13.mp4
4.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/015-720.webm
4.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/6.mp4
4.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/010-720.webm
4.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/020-720.webm
4.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/012-720.webm
4.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.97.mp4
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/12.webm
4.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/39.mp4
4.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/004-720.webm
4.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/13. Using Signed URLs.mp4
4.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/049-720.webm
4.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/10. Additional Messages.mp4
4.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/023-720.webm
4.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/015-720.webm
4.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/4.mp4
4.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/50.mp4
4.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/2. Power of Shall and Should.mp4
4.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_17.webm
4.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/30.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/05.webm
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/24.webm
4.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/007-720.webm
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/25.webm
4.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/21. Locating Problem apk Files.mp4
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/1.webm
4.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/039-720.webm
4.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/24. Security Governance.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/06.webm
4.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/53. Example 1 Better Exec Communication Heartbleed.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/11.webm
4.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/13.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/03.webm
4.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/004-720.webm
4.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/002-720.webm
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/27.webm
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/6.webm
4.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.3.mp4
4.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/20.mp4
4.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.7.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/13.webm
4.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/22. HCL Basics Resource.mp4
4.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/22. Base64 Encoding.mp4
4.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/24.mp4
4.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/20.mp4
4.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/2/4.mp4
4.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/12.mp4
4.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/006-720.webm
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/7.webm
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/08.webm
4.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/5. Lab Environment Overview.mp4
4.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/20.mp4
4.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/015-720.webm
4.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/15.mp4
4.0 MB
MGT414 - SANS Training Program for CISSP Certification/text/2019/414.4.pdf
4.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.1 WHY THE WEB/SEC542- SANS OnDemand_7.webm
4.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/017-720.webm
4.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/23.mp4
4.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/74. Policy Enforcement 2.mp4
4.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/012-720.webm
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/10.webm
4.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/011-720.webm
4.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.12.mp4
4.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/006-720.webm
4.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/009-720.webm
4.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/072-720.webm
4.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/4. General or Specific and Why 1.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/29.webm
4.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.2.mp4
4.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/4.mp4
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/20.webm
4.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.23.mp4
4.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/5.mp4
4.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/7.mp4
4.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/001-720.webm
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/16.webm
4.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/11.mp4
4.0 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/4.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/09.webm
4.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/4.webm
4.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.9.mp4
4.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_8_2.webm
4.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/86. Identify Crown Jewels Discussion.mp4
4.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.67.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/06.webm
4.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/31.mp4
4.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/13.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/04.webm
4.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/008-720.webm
4.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/11. NetworkMiner Hosts Display.mp4
4.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/01.webm
4.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/008-720.webm
4.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/25.mp4
4.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/12. Social Engineering/3.mp4
4.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/013-720.webm
4.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/69.mp4
4.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.11.mp4
4.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/6. To Get the Most Out of This Section.mp4
4.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/1. iOS Forensics Overview/6. iOS Support Software.mp4
4.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/29.mp4
4.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/13. Azure Kubernetes Service Concepts.mp4
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/15.mp4
3.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/15. Invalid Words.mp4
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/48.mp4
3.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/2.mp4
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/4.mp4
3.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/7. Certificate Details Are Not Helpful.mp4
3.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/51. Federal Reserve Bank of Atlanta Values.mp4
3.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.6.mp4
3.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.1 WHY THE WEB/SEC542- SANS OnDemand_4.webm
3.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/10.webm
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/19. CALMS Automation at Amazon.mp4
3.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/15. DISC Assessment.mp4
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/38. Container Security Commercial Runtime Defense Solutions.mp4
3.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/37.mp4
3.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/7.mp4
3.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/5. Handling Locked iOS Devices/6. iOS Encryption Explained.mp4
3.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/006-720.webm
3.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/001-720.webm
3.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/1.mp4
3.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/18. Adding a JOIN Statement to the Query.mp4
3.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.1 FORENSIC FILE CARVING/05.webm
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/21.mp4
3.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/039-720.webm
3.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/15. File Sharing Example Dropbox.mp4
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/5.mp4
3.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/2.webm
3.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/7. Android Forensics Overview/6. Key Introductions The Most Prevalent OSs.mp4
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/9.mp4
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/8.mp4
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/8. Azure Command Line Interface CLI.mp4
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/6. Code Fix for XSS.mp4
3.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/15.mp4
3.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/19. Tuckmans Teaming Model.mp4
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/31.mp4
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/3. DevOps Audit Defense Toolkit.mp4
3.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/13. SOCIAL STYLE Model.mp4
3.9 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/33.mp4
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/11.mp4
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/7.mp4
3.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/38.mp4
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/23.mp4
3.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/003-720_Getting_Started_with_Unpacking.webm
3.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/021-720.webm
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/37.mp4
3.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.2.mp4
3.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/23.mp4
3.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/12.mp4
3.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/13.mp4
3.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/6.webm
3.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/10. Target Manipulation Collection and Exfiltration/4.mp4
3.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/4. Recovering Deleted Data.mp4
3.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/11. Cyber Dust Example 2.mp4
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/32. Static Analysis in CD Catch Problems in IDE.mp4
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/6.mp4
3.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/07.webm
3.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/010-720.webm
3.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_16.webm
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/19.mp4
3.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/007-720.webm
3.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/002-720.webm
3.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/003-720.webm
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/19. KMS Essential Concepts 2.mp4
3.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/002-720.webm
3.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_10_2.webm
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/22. Creating a CMK CloudFormation Template.mp4
3.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.4.mp4
3.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/7. Free RATs Meterpreter.mp4
3.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.6.mp4
3.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/16.webm
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/2. Change Patch and Vulnerability Management/8.mp4
3.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/3. iOS File System Structures/4. Physical Acquisition Data Obtained.mp4
3.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/4.mp4
3.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/19.webm
3.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/27.webm
3.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/14.mp4
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/10. Security in CodePipeline SAST with CodeBuild.mp4
3.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/11. Crash Logs.mp4
3.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.10.mp4
3.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/1.mp4
3.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/19.webm
3.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/4.webm
3.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/12. Changing the Column Names.mp4
3.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.9 John the Ripper/SEC560 - 4.9.3.mp4
3.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/43.mp4
3.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/14.mp4
3.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_7.webm
3.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.10.mp4
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/30.mp4
3.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/12.webm
3.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_6.webm
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/6.mp4
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/6.mp4
3.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.27.mp4
3.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/19.webm
3.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/13. CD Deployment Smoke Test and Health Checks.mp4
3.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/13.webm
3.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/014-720.webm
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/13.mp4
3.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/020-720.webm
3.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/45.mp4
3.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/4.mp4
3.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/16.mp4
3.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.4 WEB APPLICATION PEN TESTER'S TOOLKIT/SEC542- SANS OnDemand_3_2.webm
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/2.mp4
3.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/2. Registry Forensic Analysis/2.mp4
3.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/2. Define Roles.mp4
3.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/47.mp4
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/13.mp4
3.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/5. ARP Spoofing Example.mp4
3.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.3 PROCESS EXECUTION/06_2.webm
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/2.mp4
3.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/2.mp4
3.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_17.webm
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/20.webm
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/20.webm
3.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/22. Jailbreaks and Exploits.mp4
3.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/24. Simplify.mp4
3.8 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/17.mp4
3.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/5.mp4
3.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/10.mp4
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/22.webm
3.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/10. Serverless Security Best Practices.mp4
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/019-720.webm
3.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/9. Very Measurable.mp4
3.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/008-720.webm
3.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/010-720.webm
3.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/9.mp4
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/14.webm
3.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/6.mp4
3.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/6. Application Files.mp4
3.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/9.mp4
3.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/11. Space Vision.mp4
3.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/25.webm
3.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/11.webm
3.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/2.mp4
3.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/31.mp4
3.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/28.mp4
3.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/4. USB Debugging.mp4
3.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/12.webm
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/009-720.webm
3.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/032-720.webm
3.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/003-720.webm
3.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/49.mp4
3.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/10. Creating a CloudFront Distribution.mp4
3.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/6/4.mp4
3.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/24. Unit Testing for Security Test Coverage.mp4
3.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/4.mp4
3.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/1. iOS Forensics Overview/3. iOS Forensics Agenda.mp4
3.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/3.mp4
3.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/11.mp4
3.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/18. dumpsys Extractions.mp4
3.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/031-720.webm
3.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/2. Locked Android Devices/3. Best Practices for Handling Locked Android Devices.mp4
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_05.webm
3.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/6. Recommendations.mp4
3.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/3. iCloud Extractions/5. Accessing iCloud Backup Files 3.mp4
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_08.webm
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/022-720.webm
3.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/023-720.webm
3.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/3. Android Filesystem Quick Look.mp4
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/002-720.webm
3.8 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/14.mp4
3.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/002-720.webm
3.8 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/sftp to dev-null.ogv
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_08.webm
3.8 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/23.mp4
3.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/7.mp4
3.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/5. Herzbergs Hygiene and Motivational Factors 1.mp4
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/10.webm
3.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/11.mp4
3.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/014-720.webm
3.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/011-720.webm
3.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/18.mp4
3.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/40. Jashopper Case Debrief.mp4
3.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/6. Android SDK Manager.mp4
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_09.webm
3.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/11. Reconnaissance/3.mp4
3.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/17. Retail Industry Mission 2.mp4
3.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/11. Potentially Unwanted Applications PUA.mp4
3.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/3. Communication Content and Context.mp4
3.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/038-720.webm
3.8 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/012-720.webm
3.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/33. Step 1 Understand Stakeholders.mp4
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/4.webm
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_02.webm
3.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/8.mp4
3.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/013-720.webm
3.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/01.webm
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/16.webm
3.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/15. Face ID Bypass.mp4
3.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.21.mp4
3.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/24. Russia Data Protection Laws.mp4
3.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/17.mp4
3.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_15.webm
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/12.webm
3.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/004-720.webm
3.8 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/10.mp4
3.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/018-720.webm
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/14.webm
3.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/1.mp4
3.8 MB
MGT414 - SANS Training Program for CISSP Certification/text/2019/414.7.pdf
3.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/010-720.webm
3.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/28.mp4
3.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.6 Web App Overview/SEC560 - 5.6.3.mp4
3.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/007-720.webm
3.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/25. JWT Critical Vulnerability.mp4
3.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/18.mp4
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/26.webm
3.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/22.webm
3.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/36.webm
3.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/11. AWS Command Line Interface.mp4
3.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/27. Current State of DevOps Security.mp4
3.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/011-720.webm
3.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/22. Cloud Custodian.mp4
3.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/3. Newer Meaning of Serverless.mp4
3.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/27. Balanced Scorecard Example.mp4
3.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/012-720.webm
3.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/48. OCC Example Risk Appetite Statement.mp4
3.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_2_2.webm
3.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.2 Pilfering from Target Machines/SEC560 - 4.2.4.mp4
3.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/022-720.webm
3.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/7. Android Forensics Overview/5. Android Updates and Considerations.mp4
3.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/1. iOS Forensics Overview/8. Apple Continuity.mp4
3.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/32.mp4
3.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/12.mp4
3.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/11.webm
3.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/021-720.webm
3.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/2. The Dev Ops Disconnect The Need for Speed.mp4
3.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/7.mp4
3.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/14.webm
3.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/33.webm
3.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/01.webm
3.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/35. Culture and Exception Requests.mp4
3.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/013-720.webm
3.7 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/018-720.webm
3.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.28.mp4
3.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/010-720.webm
3.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/46. Three Things That Make Executives Unique.mp4
3.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/23. Learn It Use It or Lose It.mp4
3.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/23.mp4
3.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/3. Affected Platforms.mp4
3.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/16. Todays Reality When You Have Root or Jailbreak.mp4
3.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/3.mp4
3.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/15.mp4
3.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/5.mp4
3.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/17.mp4
3.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_8.webm
3.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/007-720.webm
3.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_04.webm
3.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/005-720.webm
3.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/047-720.webm
3.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/27.mp4
3.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/052-720.webm
3.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/15. Sponsorship Tips.mp4
3.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/7. Sensitive Android Code.mp4
3.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/11.mp4
3.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/15.webm
3.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/5.mp4
3.7 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/4.mp4
3.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/10.webm
3.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/6.mp4
3.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/27.webm
3.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/012-720.webm
3.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/011-720.webm
3.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/2.mp4
3.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/1. About the Course/1.mp4
3.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/010-720.webm
3.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/026-720.webm
3.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/5.mp4
3.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/021-720.webm
3.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/5.mp4
3.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_10.webm
3.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/06.webm
3.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.38.mp4
3.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/2.webm
3.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/40. Lab 24 Audit Dockers Security.mp4
3.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/005-720.webm
3.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/15.mp4
3.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/21.mp4
3.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/6. Internet of Things and SCADA/8.mp4
3.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/22. Policy Enforcement 1.mp4
3.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/23.mp4
3.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/24.mp4
3.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/4.mp4
3.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/15.webm
3.7 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/18.mp4
3.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/18.mp4
3.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/12.mp4
3.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/005-720.webm
3.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/017-720.webm
3.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_09.webm
3.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/52. Intrusion Kill Chain 1.mp4
3.7 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/013-720.webm
3.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/27.mp4
3.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/20. Examples Using dumpsys 2.mp4
3.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/15. Container Security Isolation.mp4
3.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/13.webm
3.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/12. Application Storage Where Is the User Data.mp4
3.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/7.mp4
3.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/014-720.webm
3.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/23. Detecting Runtime Modification.mp4
3.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/20.webm
3.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/13.mp4
3.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/21. Other Useful ADB commands.mp4
3.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/34.webm
3.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/11.mp4
3.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/6.mp4
3.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.24.mp4
3.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_4.webm
3.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.10.mp4
3.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/18. Android Logs 2.mp4
3.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.90.mp4
3.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/36.mp4
3.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/13.mp4
3.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/14.webm
3.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/017-720.webm
3.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.8 SUMMARY/SEC542- SANS OnDemand_3.webm
3.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/29. Zillow and ForeSee Analytics.mp4
3.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/15. SD Cards Analysis.mp4
3.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/015-720.webm
3.6 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/5.mp4
3.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/2. Building Your Lab.mp4
3.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/7. iOS Passcode Bypass Flaws.mp4
3.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_2_2.webm
3.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/019-720.webm
3.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/019-720.webm
3.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.3.mp4
3.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/013-720.webm
3.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/12.mp4
3.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/16. Why We Need a Stakeholder Management Strategy 2.mp4
3.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/13.mp4
3.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_07.webm
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/47.webm
3.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/8. Contacts.mp4
3.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/002-720.webm
3.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/2/3.mp4
3.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/24.mp4
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/1.webm
3.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/003-720.webm
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/17.webm
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/17.mp4
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/6.mp4
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/8.mp4
3.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/14. Common Data Loss IMEI.mp4
3.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/011-720.webm
3.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/9. Types of Mobile Malware.mp4
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/11.webm
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/23.mp4
3.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/092-720.webm
3.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/025-720.webm
3.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.2 LOGIC ATTACKS/SEC542- SANS OnDemand_3_2.webm
3.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/9.mp4
3.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/23. Runtime Application SecuritySelf Protection RASP.mp4
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/17.mp4
3.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/04.webm
3.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/9. Acquisition Overview UFED Physical Analyzer 3.mp4
3.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.7 HTTP SYNTAX AND MESSAGING/SEC542- SANS OnDemand_6_2.webm
3.6 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/29.mp4
3.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/13. Adding SAST to CodePipeline Run on Container.mp4
3.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/02.webm
3.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/007-720.webm
3.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/015-720.webm
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/30.webm
3.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/75.mp4
3.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/1. About the Course/4.mp4
3.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/9.mp4
3.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/9.mp4
3.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/14.mp4
3.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/009-720.webm
3.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/026-720.webm
3.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/023-720.webm
3.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/1. Introduction to Device Architecture and Common Mobile Threats/1. Device Architecture and Application Interaction.mp4
3.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/13. S3 Default Encryption.mp4
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/34.webm
3.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/6.mp4
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/5.webm
3.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/18.mp4
3.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_10.webm
3.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/12.mp4
3.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.11.mp4
3.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/18.webm
3.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/57. Lab Debrief 2.mp4
3.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/005-720.webm
3.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.3.mp4
3.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/6. Smartphone Forensic Capstone Exercise/1. Smartphone Forensic Capstone Exercise/2. Rules of Engagement.mp4
3.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/18.webm
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/45.mp4
3.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/023-720.webm
3.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/8.mp4
3.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/4. Serverless Benefits for DevOps Teams.mp4
3.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.99.mp4
3.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/08.webm
3.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/023-720.webm
3.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/017-720.webm
3.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/15.webm
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/2.webm
3.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/006-720.webm
3.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/18.mp4
3.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/7.mp4
3.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/31. Network Address Translation NAT Gateway.mp4
3.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/33.mp4
3.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/020-720.webm
3.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/6. SQLite Storage Classes BLOBs.mp4
3.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/24. Secret Search.mp4
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/36.webm
3.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/7.mp4
3.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/03.webm
3.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/002-720.webm
3.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/011_526/001-720.webm
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/3.mp4
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/10.mp4
3.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/6.mp4
3.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/8.mp4
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/21.mp4
3.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.10.mp4
3.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/17. Looking for Artifacts Outside of the Application Directory.mp4
3.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/15.mp4
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/19.mp4
3.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/010-720.webm
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/2.mp4
3.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/28. Performance Analysis Quadrant PAQ.mp4
3.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/5. AXIOM Fundamentals/4. AXIOM ThirdParty Application Parsing.mp4
3.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/17.mp4
3.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/3. How Not to Keep Secrets In Code.mp4
3.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/007-720.webm
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/34.webm
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/5.mp4
3.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/26.webm
3.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/2.mp4
3.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/2. Locked Android Devices/4. Reality of Locked Android Devices.mp4
3.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/12. Using ServerSide Encryption with S3 Upload File 1.mp4
3.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/1/7.mp4
3.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/041-720.webm
3.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/017-720.webm
3.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_01.webm
3.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/5. Recovering Attachments Embedded in Database.mp4
3.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/3.mp4
3.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.23.mp4
3.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.2 Sniffing with tcpdump/SEC560 - 2.2.2.mp4
3.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/10.mp4
3.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/10. Private Browsing Evidence in Tabs and Snapshots.mp4
3.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/12.webm
3.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/003-720.webm
3.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.2.mp4
3.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/20. Snapchat Example 2.mp4
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/1.webm
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/2.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/45.mp4
3.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/11.mp4
3.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/032-720.webm
3.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/32. Security Challenges in DevOps Confidentiality.mp4
3.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/18.webm
3.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/36. Android Key Store Use.mp4
3.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/14. Microservice API Gateway Architecture.mp4
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/68. Cost Approach.mp4
3.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/16. Android Nougat Certificate Trust 1.mp4
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/1.webm
3.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/18. Container Security Official Images.mp4
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/15. International PCI DSS.mp4
3.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/014-720.webm
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/8. Bounds of Acceptable Behavior Example.mp4
3.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/4.mp4
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/31. Security Culture Tipoffs.mp4
3.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/9. Keyword Searching.mp4
3.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/11.mp4
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/61. What Is a Business Model.mp4
3.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/8. Dalvik Bytecode Introduction.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/26.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/13.mp4
3.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_13.webm
3.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/20. Internet History 2.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/12.mp4
3.5 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/30.mp4
3.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/10. Monitoring Cain APR.mp4
3.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/26. Jenkins Pipeline as Code Declarative Syntax.mp4
3.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/24.mp4
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/9.webm
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/27.webm
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/43.mp4
3.5 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/3. Core Windows Forensics Focus on Analysis/2.mp4
3.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/32.mp4
3.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/23. Google Play Protect.mp4
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/23.webm
3.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/11. Exercise Closure/3.mp4
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/82. Most Critical Assets.mp4
3.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/4.mp4
3.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/018-720.webm
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/12.webm
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/31.webm
3.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.4.mp4
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/23.webm
3.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/7. Acquisition Overview UFED Physical Analyzer 1.mp4
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/23.webm
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/1. Course Roadmap 1.mp4
3.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/06.webm
3.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/18.mp4
3.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/14.mp4
3.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/003-720.webm
3.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/003-720.webm
3.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/014-720.webm
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/36.mp4
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/15. iPremier Case B Group Discussion.mp4
3.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/13.webm
3.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_9.webm
3.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/11. What Can Go Wrong.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/35.mp4
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/29.webm
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/40. Time Management Grid Stephen Covey.mp4
3.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/68. Dynamic Scanning DAST in CICD Success Factors.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/6.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/8.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/11.mp4
3.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_7.webm
3.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/65. Testing in CD Follow the Test Pyramid.mp4
3.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/37.mp4
3.5 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/021-720.webm
3.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.11.mp4
3.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/08.webm
3.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/16. SIM Card Artifacts.mp4
3.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/11.webm
3.5 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/20.mp4
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/69. Cost Approach Issues.mp4
3.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/6.mp4
3.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/018-720.webm
3.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/5. Android Snapshots.mp4
3.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/22. Creating a Mission Statement for the Security Department.mp4
3.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/17. Broken Session Management.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/18.mp4
3.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/7.mp4
3.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/1. Introduction to Device Architecture and Common Mobile Threats/4. Table of Contents.mp4
3.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/24.mp4
3.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/16.mp4
3.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/04.webm
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/5. General or Specific and Why 2.mp4
3.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/20. Herrevad and WifiConfigStore.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/29.mp4
3.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/040-720.webm
3.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/2. Locked Android Devices/5. Verifying a Lock Setting 1.mp4
3.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/020-720.webm
3.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/007-720.webm
3.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/10. Android and Data Storage.mp4
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/32. Lab Debrief 1.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/15.mp4
3.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/008-720.webm
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/34. Step 2 Mapping Power and Interest.mp4
3.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/10. Cyber Dust Example 1.mp4
3.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.3.mp4
3.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/051-720.webm
3.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/21.webm
3.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/008-720.webm
3.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/41.mp4
3.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/20. YiSpecter Malware.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/16.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/11.mp4
3.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/033-720.webm
3.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/14.mp4
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/4. Visioning and Innovation.mp4
3.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/20.mp4
3.4 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/16.mp4
3.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/13.webm
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/8. Phases of Computing.mp4
3.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/26.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/7.mp4
3.4 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/9.mp4
3.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/15.webm
3.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.4.mp4
3.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/6. iOS Application Interaction/7. iOS App Extensions.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/14.mp4
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/19. European Union GDPR.mp4
3.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/12. Smartphone Component Consideration.mp4
3.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/44.mp4
3.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/37.webm
3.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/15.webm
3.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/17. Smartphone Acquisition Terms.mp4
3.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/8.webm
3.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_11.webm
3.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.8.mp4
3.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/017-720.webm
3.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/9.webm
3.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/6. Microservice Architecture Attack Surface.mp4
3.4 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/7. Advanced Acquisition/3.mp4
3.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_10.webm
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/22. European Union NIS Directive.mp4
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/10. Valence and Arousal.mp4
3.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/12. iOS App Retrieval.mp4
3.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/28.mp4
3.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/1. iOS Forensics Overview/9. iOS 13 Changed the Game.mp4
3.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_04.webm
3.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/035-720.webm
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/7.mp4
3.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/032-720.webm
3.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/14.webm
3.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/26.mp4
3.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/015-720.webm
3.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/22.webm
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/50. Lab Debrief 2.mp4
3.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/15. Signing the Modified APK.mp4
3.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/4. Evidence of iOS Wiping 2.mp4
3.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/10.mp4
3.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/15. EC2 Instances Weighted Target Groups.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/11.mp4
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/37. Organizational Adoption.mp4
3.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/5. Using What You Have to Enhance Your Search.mp4
3.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/10. Target Manipulation Collection and Exfiltration/2.mp4
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/10. NationStates.mp4
3.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.10.mp4
3.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.29.mp4
3.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.5 - Crypto Exploit Concepts/005-720.webm
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/14.mp4
3.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/097-720.webm
3.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/3. Configuration Management Chef.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/8.mp4
3.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/20.webm
3.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/62. Mobile Device Search Example.mp4
3.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/24.mp4
3.4 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/59.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/12.mp4
3.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/25. KMS and SelfManaged Master Keys.mp4
3.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/19.mp4
3.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.57.mp4
3.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_7.webm
3.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/7. Jailbreak iOS.mp4
3.4 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/005-720.webm
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/9.mp4
3.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/012-720.webm
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/7.mp4
3.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/10.webm
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/7.mp4
3.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/24.mp4
3.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/008-720.webm
3.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/015-720.webm
3.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/10.mp4
3.4 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/11.mp4
3.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/11. Reconnaissance/5.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/34.mp4
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/025-720.webm
3.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/17. Evaluate File System Use.mp4
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/43. Lab 31 CloudFormation Security Review.mp4
3.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.17.mp4
3.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_19.webm
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/4. Diversify Your Team Styles.mp4
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/54. Managing Vulnerable Dependencies OpenSource Tools.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/4.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/2.mp4
3.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/36.mp4
3.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/29.mp4
3.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/008-720.webm
3.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/19.mp4
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/11. Serverless Security Use Cases.mp4
3.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/2. SQLite Databases What Are They and Why Phones Use Them.mp4
3.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/3. Internet Browser Forensics/3.mp4
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/024-720.webm
3.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/022-720.webm
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/012-720.webm
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/060-720.webm
3.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/053-720.webm
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/31.webm
3.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/14.webm
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/57. Example 3 Better Exec Communication DDoS.mp4
3.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/012-720.webm
3.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_15.webm
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/16.webm
3.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/65.mp4
3.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/7.mp4
3.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/17. iOS 10 iOS 13 Backups Manifestdb.mp4
3.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/06.webm
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/006-720.webm
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/27.webm
3.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/26.webm
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/3.mp4
3.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.82.mp4
3.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/033-720.webm
3.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/033-720 (1).webm
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/8. ClientSide Encryption 2.mp4
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/16.webm
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/017-720.webm
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/9.webm
3.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_11.webm
3.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/24.mp4
3.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/017-720.webm
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/29. Metrics Communication Guidelines.mp4
3.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/21. Android Smart lock.mp4
3.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/9. TCCDB Transparency Consent and Control.mp4
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/24. Classless InterDomain Routing CIDR.mp4
3.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/11.mp4
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/022-720.webm
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/2. Rules and Regulations/2.mp4
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/24.webm
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/009-720.webm
3.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/16.webm
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/5.webm
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/33. What Would the Approach to Policy Be If.mp4
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/019-720.webm
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/24. Automated Testing of Puppet Code.mp4
3.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.35.mp4
3.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/074-720.webm
3.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/001-720.webm
3.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/018-720.webm
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/11.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/4.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/43.mp4
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/14.webm
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/5. Hunt the Bug Broken Access Control.mp4
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/24.webm
3.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/019-720.webm
3.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/1.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/13.mp4
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/45. Technological Examples.mp4
3.3 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/3.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/27.mp4
3.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/005-720.webm
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/13.mp4
3.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.1 Moving Files with Exploits/SEC560 - 4.1.4.mp4
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/41. In Summary 2.mp4
3.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/88.mp4
3.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/37.webm
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/5. Microsoft Security Risk Detection.mp4
3.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/2. Modifying Mobile Applications.mp4
3.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/15. BetterCap Sslstrip.mp4
3.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/26. Viewing Plist Files.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/16.mp4
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/005-720.webm
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/5.mp4
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/41. Economic Examples.mp4
3.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/032-720.webm
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/19. Signal Sciences SaaS platform for Web Security Visibility.mp4
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/10. Protect Data Technology Disposal Example.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/14.mp4
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/4. Can Do and Cannot Do.mp4
3.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/4. Unrestricted Device Legality.mp4
3.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/1/8.mp4
3.3 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/7.mp4
3.3 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/013-720.webm
3.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/5.mp4
3.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/23.mp4
3.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_10.webm
3.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.11.mp4
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/011_526/007-720.webm
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/22.mp4
3.3 MB
SEC506 - Securing Linux-Unix/video/2011/Day 3 - Hardening Unix-Linux Systems Part 3/Extra/fanout.ogv
3.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/12.mp4
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/14. AWS Route 53 Weighted Routing.mp4
3.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.11.mp4
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/10.webm
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/14.webm
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/40.webm
3.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/4. From Infrastructure to Code.mp4
3.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/20.mp4
3.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/6.webm
3.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/7. Android Forensics Overview/4. Google and Remote Access.mp4
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/10. Your Security Team History Example.mp4
3.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/1. Strategic Roadmap Development.mp4
3.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/32.mp4
3.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/003-720.webm
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/013-720.webm
3.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/031-720.webm
3.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/54. Negative Voicing Examples.mp4
3.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/026-720.webm
3.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/005-720.webm
3.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/21. Incident Response Game Days and Postmortems.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/5.mp4
3.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/12. Technology Vision.mp4
3.2 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/8.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/8. Managing AVDs.mp4
3.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/27.mp4
3.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/055-720.webm
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/10. iOS 1141 USB Restricted Mode.mp4
3.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/7. Smartphone Forensics.mp4
3.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/13. Sysdiagnose 3.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/18.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/17. Test the Modified Application.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/7. Needle heapdump Module.mp4
3.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/002-720_Analyzing_Multi-Technology_Malware.webm
3.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/05.webm
3.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/29.mp4
3.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/13.mp4
3.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/006-720.webm
3.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/06.webm
3.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/30.mp4
3.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/17.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/14.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/10. Needle Potential.mp4
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.2 Sniffing with tcpdump/SEC560 - 2.2.5.mp4
3.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/006-720.webm
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.91.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/15.mp4
3.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/66. Porters Five Forces.mp4
3.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/2. PowerShell for Local Users and Groups/2.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/9.webm
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/2.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/15.mp4
3.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.12 HEART BLEED/SEC542- SANS OnDemand_6.webm
3.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/61.mp4
3.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_10.webm
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/4.mp4
3.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/090-720.webm
3.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/6. AWS Regions Supported by the Course.mp4
3.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/2.mp4
3.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/17.mp4
3.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/4.mp4
3.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/023-720.webm
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.18.mp4
3.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/5. AWS Regions and Availability Zones.mp4
3.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/016-720.webm
3.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/05.webm
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/10. Examine Methods.mp4
3.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_7.webm
3.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/6. DevOps Audit Defense Toolkit Peer Reviews.mp4
3.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/11. Background and Need for Strategic Planning.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/26.mp4
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.8.mp4
3.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/10. HEIC Views in Commercial Tools.mp4
3.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/018-720_Malware_Memory_Forensics.webm
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/8.mp4
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.7.mp4
3.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/12.webm
3.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/3.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/8.webm
3.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/9. iPremier Tools for Success.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/9.webm
3.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/9.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/24.webm
3.2 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/027-720.webm
3.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/005-720.webm
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/19.webm
3.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/2.mp4
3.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/010-720.webm
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/12.mp4
3.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/20. PostProduction Checks.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/18.webm
3.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/12.webm
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/4.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/10. Android Account Isolation.mp4
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.6.mp4
3.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/003-720.webm
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/27.mp4
3.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/19.webm
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/25. Citizen Lab Lookout Analysis.mp4
3.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/10. Attachment JOINS Query Language.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/9.mp4
3.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/30.mp4
3.2 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/6.mp4
3.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/8. Dr Bernard M Bass on Why People Become Leaders.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/13. Ouija ReplaceWords.mp4
3.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/016-720.webm
3.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/6. General or Specific and Why 3.mp4
3.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/19. Monitoring Architecture.mp4
3.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.5-Command Injection/SEC542- SANS OnDemand_4.webm
3.2 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/9.mp4
3.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/005-720.webm
3.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/023-720.webm
3.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/18.webm
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.12.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/3.webm
3.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/013-720.webm
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/5.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/5.mp4
3.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/49. Course Roadmap 5.mp4
3.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/10. Continuous Delivery at LMAX.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/16. Jailbreak Detection Evasion.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/27. Manipulating PhoneGap.mp4
3.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/23.mp4
3.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/10. Was the Application of Interest Used.mp4
3.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/6. Cloud Free Tier Accounts.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/21.webm
3.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/026-720.webm
3.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/011-720.webm
3.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/11.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/6. iOS Application Interaction/1. Course Roadmap.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/16.webm
3.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/19. Bootloader Extractions.mp4
3.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/30. Frida Inspecting Method Arguments.mp4
3.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/27. Application Examples.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/12.webm
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/31.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/18.webm
3.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/16.mp4
3.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/30.mp4
3.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/14. File Sharing.mp4
3.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/010-720.webm
3.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/51. Threat Analysis 1.mp4
3.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/05.webm
3.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/044-720.webm
3.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/003-720.webm
3.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/8.mp4
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.23.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/20.mp4
3.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/9.mp4
3.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/4.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/22.webm
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.46.mp4
3.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.101.mp4
3.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/006-720.webm
3.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/1. Security Assessment Strategies/4.mp4
3.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/22.webm
3.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/21. AWS Security Benchmark Commands.mp4
3.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/19.webm
3.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/9.mp4
3.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/007-720.webm
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/10.webm
3.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/2. The SIFT Workstation/5. Keeping the Pace.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/7.mp4
3.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/009-720.webm
3.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/51.mp4
3.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/37. CloudFormation EC2 Instance Profiles.mp4
3.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.5 - Crypto Exploit Concepts/002-720.webm
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/10.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/10.mp4
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/14.webm
3.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/061-720.webm
3.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/34.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/13.mp4
3.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/2. Locked Android Devices/7. The Reality Check.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/41.mp4
3.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/12. Network as Code Tooling.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/26.mp4
3.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/32.mp4
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.88.mp4
3.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_05.webm
3.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/53.mp4
3.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/6.mp4
3.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/25. CALMS Sharing.mp4
3.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/003-720.webm
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/023-720.webm
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.2.mp4
3.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/7. Reasonable Person Example.mp4
3.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_23.webm
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/17.mp4
3.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/2.mp4
3.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/20.webm
3.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/32.mp4
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/015-720.webm
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/51.webm
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/021-720.webm
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/2.mp4
3.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_5_2.webm
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/009-720.webm
3.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/66. Acceptance Phase Kinds of Security Tests.mp4
3.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/7.mp4
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/013-720.webm
3.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/28.mp4
3.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/43. Lab Debrief 1.mp4
3.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/13. Editing Dalvik Bytecode Small Changes.mp4
3.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/56.mp4
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.5.mp4
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.2.mp4
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/4.webm
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/20.webm
3.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/04.webm
3.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/2. SANS DFIR.mp4
3.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_11.webm
3.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/18. iOS Malware Phishing.mp4
3.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/19. Android Backup.mp4
3.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_12.webm
3.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/4.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/4.mp4
3.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.3 - Web Framework Defenses/004-720.webm
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.1 Moving Files with Exploits/SEC560 - 4.1.5.mp4
3.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/30.mp4
3.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/38. Gather Data.mp4
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/011-720.webm
3.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/07.webm
3.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/5.mp4
3.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/6.mp4
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/28.webm
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/14.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/12.mp4
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.6.mp4
3.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/4.mp4
3.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/10. File Carving/4.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/8.mp4
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/022-720.webm
3.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/49.mp4
3.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/35. Assessing Security Maturity.mp4
3.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/006-720.webm
3.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/35.mp4
3.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/17.mp4
3.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_9.webm
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/4.mp4
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/5.webm
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/009-720.webm
3.1 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/video/2019/660.2 - Crypto and Post-Exploitation/2.8 Appendix B. Management Tasks with Powershell.mkv
3.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/5. Premium RateShort Code SMS.mp4
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/8.webm
3.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/20.mp4
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.2.mp4
3.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/7.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/13.mp4
3.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/7.mp4
3.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/40.mp4
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/19.webm
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/14.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/16.mp4
3.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/8.mp4
3.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/012-720.webm
3.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/017-720.webm
3.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/017-720.webm
3.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/18. Accessibility Service.mp4
3.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/010-720.webm
3.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/3. Administrator Motivators.mp4
3.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/22.mp4
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.9.mp4
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/7.webm
3.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/004-720.webm
3.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/16. Terraform Considerations.mp4
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/52.webm
3.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/6. MOBSF.mp4
3.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/3.mp4
3.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/20. CALMS Lean.mp4
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.7.mp4
3.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/26. ipa Payload Package Contents.mp4
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/017-720.webm
3.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/7. Android Forensics Overview/3. Android File System Examples.mp4
3.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/34. Cloud Security Misconfiguration.mp4
3.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/9.mp4
3.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/31. Visioning and Innovation.mp4
3.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/004-720.webm
3.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/12.webm
3.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.2.mp4
3.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/007-720.webm
3.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/1/6.mp4
3.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/008-720.webm
3.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/13.webm
3.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/15. Stages of a Typical Mobile Malware Attack.mp4
3.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_03.webm
3.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_2.webm
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/017-720.webm
3.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/28.mp4
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/35. Amazon Machine Images AMI.mp4
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/010-720.webm
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/018-720.webm
3.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/020-720.webm
3.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/3. iOS File System Structures/5. Full File System Data Obtained.mp4
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/14.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/6.webm
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/13. Azure Functions Serverless Security Features.mp4
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/22.mp4
3.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.9.mp4
3.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/004-720.webm
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/31.webm
3.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/8.mp4
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/9.mp4
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/8. Technical Metrics Examples.mp4
3.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/025-720.webm
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/45. Gap Analysis Current and Future.mp4
3.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/4.mp4
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/022-720.webm
3.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/003-720.webm
3.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/7. Android Malware.mp4
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/70. Strategic Objectives Ryanair.mp4
3.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/16.webm
3.0 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/13.mp4
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/57. Pyramid of Pain.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/49.webm
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/22.mp4
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/14.mp4
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/6.mp4
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/31.mp4
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/9.mp4
3.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/006-720.webm
3.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/001-720_Malware_Memory_Forensics.webm
3.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/021-720.webm
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/10.webm
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/10.mp4
3.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.11.mp4
3.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/042-720.webm
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/76.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/10.webm
3.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.61.mp4
3.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/015-720.webm
3.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/018-720.webm
3.0 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/17.mp4
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/008-720.webm
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/19.mp4
3.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/011-720.webm
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/14.webm
3.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/012-720.webm
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/20.mp4
3.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/9. Explore the Current Window.mp4
3.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/8. Navigate to Referenced Path.mp4
3.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_11.webm
3.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/14.webm
3.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.10.mp4
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/19. Six Cs of Career Management.mp4
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/18.mp4
3.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/12.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/1.webm
3.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/09.webm
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/065-720.webm
3.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/20.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/22.webm
3.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/004-720.webm
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/023-720.webm
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/11.mp4
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/23. PharmaCo Introduction.mp4
3.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/27.mp4
3.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/4.mp4
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/15.mp4
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/4.mp4
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/009-720.webm
3.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/028-720.webm
3.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/024-720.webm
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/5. DevOps Audit Defense Toolkit Change Control.mp4
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/5.mp4
3.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/13. Ettercap Target Designation.mp4
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/14. CD Pipeline Rules.mp4
3.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_5_2.webm
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/42.mp4
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/47.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/5.webm
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/6. About This Course.mp4
3.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/002-720.webm
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/17.mp4
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/9. Provisioning Development and Test VM Vagrant.mp4
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/47.mp4
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/83. Institutionalizing Security.mp4
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/21. HCL Basics Provider.mp4
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/8.mp4
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/057-720.webm
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/81. Tips for Creating a Security Business Case.mp4
3.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/005-720.webm
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/16.webm
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/8.webm
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/1. Course Roadmap 1.mp4
3.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/2.mp4
3.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/21.webm
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/37. Security Controls.mp4
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/40.mp4
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/31.mp4
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/29.mp4
3.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.22.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/50.webm
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/13.mp4
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/21. Unit Testing.mp4
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/28.mp4
3.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/24. FRIDA CLI 1.mp4
3.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/6.mp4
3.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/25.mp4
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/34.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/13.webm
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/2.mp4
3.0 MB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/005-720.webm
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/30. Parameter Store vs Secrets Manager.mp4
3.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/004-720.webm
3.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/2.mp4
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/30. Organizational Culture.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/31.webm
3.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/007-720.webm
3.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/016-720.webm
3.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/9.mp4
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/4. Container Standards.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/14.webm
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/17.mp4
3.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/20. AWS Security Benchmark Project.mp4
3.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/28.webm
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/34.mp4
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/19.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/14.webm
3.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/006-720.webm
3.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/10. frostingdb.mp4
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/5.webm
3.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/012-720.webm
3.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/29.webm
3.0 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/2. Registry Forensic Analysis/1.mp4
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/20.mp4
3.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/008-720.webm
3.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/3.mp4
3.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/26. Step 4 Draft the Mission Example.mp4
3.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/30.mp4
2.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/26. Define Scope.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/1.webm
2.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.11-Summary/SEC542- SANS OnDemand_2.webm
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/3.mp4
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/003-720.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/17.mp4
2.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/14. Mobile Malware Infection Vectors.mp4
2.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/007-720.webm
2.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/14. Delivery/2.mp4
2.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/005-720.webm
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/011-720.webm
2.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/013-720.webm
2.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_6.webm
2.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/007-720.webm
2.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.12 HEART BLEED/SEC542- SANS OnDemand_3_2.webm
2.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/6.mp4
2.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/016-720.webm
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/6.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/18.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/6.webm
2.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/53. Step 3 Prioritize New Initiatives.mp4
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/2. Leveraging Mobile Malware.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/7.webm
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/022-720.webm
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/26. Lab 52 CloudMapper Continuous Audit.mp4
2.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/4.mp4
2.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/40. Mapping Controls to the Security Framework.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/15.webm
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/51.mp4
2.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/4.mp4
2.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/022-720_Analyzing_Multi-Technology_Malware.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/11.mp4
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/47. SAST Technology Landscape Language Support 1.mp4
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/4. iOS Simulator.mp4
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/3.mp4
2.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/8. Defining Root Access.mp4
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/15. Oreo Accessibility Fixes.mp4
2.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/007-720.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/46.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/5.webm
2.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_14_2.webm
2.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.3.mp4
2.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/024-720.webm
2.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/003-720.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/20.mp4
2.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/008-720.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/38.mp4
2.9 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/29.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/9.webm
2.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand_3_3.webm
2.9 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/15.mp4
2.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.19.mp4
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/25.mp4
2.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/10.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/19.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/34.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/2. The Dark Web/2.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/17.webm
2.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/44. Intel SWOT Analysis Weaknesses.mp4
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/24. RASP and IAST Solutions.mp4
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/28. Lab 23 Manage Configuration with Puppet.mp4
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/15. RDS Encryption Caveats.mp4
2.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_16.webm
2.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.4.mp4
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/5. Managing Containers Orchestrator Platforms.mp4
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/7.mp4
2.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/03.webm
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/040-720.webm
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/011-720.webm
2.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/17.webm
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/8.mp4
2.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/008-720.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/3.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/19.mp4
2.9 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/39.mp4
2.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/024-720.webm
2.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/5. Example RedDrop Android OS.mp4
2.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/08.webm
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/7.mp4
2.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/14. Delivery/4.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/7.mp4
2.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/011-720.webm
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/014-720.webm
2.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/18. Signal Decryption.mp4
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/15. Refactor and Rename.mp4
2.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/007-720.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/16.mp4
2.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/6.mp4
2.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/7. Was the Application of Interest Used.mp4
2.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/19.mp4
2.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/45.mp4
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/011-720.webm
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/21.webm
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/14. Azure Kubernetes Service CLI or Azure Cloud Shell.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/23.mp4
2.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/2. PowerShell for Local Users and Groups/9.mp4
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/38. Dunder Mifflin Virtual Private Cloud.mp4
2.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/12.webm
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/069-720.webm
2.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/026-720.webm
2.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.9.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/11.mp4
2.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/014-720.webm
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/013-720.webm
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/72.mp4
2.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/3. Motivation and Introduction/5.mp4
2.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/31.webm
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/8. Infrastructure as Code Hardening.mp4
2.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/022-720.webm
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/014-720.webm
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/5. Decompile to Smali.mp4
2.9 MB
MGT414 - SANS Training Program for CISSP Certification/text/2019/414.8.pdf
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/23.mp4
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/20. Import Into Visual Studio Annotate.mp4
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/100.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/13.webm
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/20.webm
2.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/70. Ranges of Expected Loss.mp4
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/5. Android Emulator.mp4
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/15. Logs.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/22.webm
2.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/17.mp4
2.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/12. Building the Query.mp4
2.9 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/015-720.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/39.mp4
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/24. iOS Backup.mp4
2.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/13. Policy Life Cycle Management.mp4
2.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 7/7.1 ALL pyWARS QUESTIONS SOLUTIONS/32.webm
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/5.mp4
2.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/016-720.webm
2.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/033-720.webm
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/30. Docker Security Dropping Capabilities on Linux.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/2.mp4
2.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/11. NotPetya.mp4
2.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/1. Classify Information and Supporting Assets/7.mp4
2.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/1. Security Policy Development and Assessment.mp4
2.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/23.webm
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/13. Installing Mobile Assistant.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/12.mp4
2.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.19.mp4
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/14. Meterpreter Pivoting.mp4
2.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/019-720.webm
2.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/068-720.webm
2.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_11_2.webm
2.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/14. Generate Signing Keys.mp4
2.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.7.mp4
2.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/10.mp4
2.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/3.mp4
2.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/3.mp4
2.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/5.mp4
2.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/44. N iche Identify Value Proposition.mp4
2.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/3.mp4
2.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/81. Integrating Manual ReviewsTesting in CD.mp4
2.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/011-720.webm
2.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/7.mp4
2.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/49.webm
2.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.14.mp4
2.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/003-720.webm
2.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/81.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/2.webm
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/022-720.webm
2.8 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/15.mp4
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/9.mp4
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/14.mp4
2.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/004-720.webm
2.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/12. Android Databases.mp4
2.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/6. Android IPC Content Providers.mp4
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/24.mp4
2.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.9 John the Ripper/SEC560 - 4.9.7.mp4
2.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/5. Reality Mobile Devices and Business.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/22.webm
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/3.webm
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/17.webm
2.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/5.mp4
2.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/12. Soft Expiration Date.mp4
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/9.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/7.webm
2.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/4. Unlocking the Bootloader.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/38.webm
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/11.mp4
2.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/9. OWASP Serverless Security Resources.mp4
2.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/28.webm
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/16.webm
2.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/7.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/32.webm
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/9.webm
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/011-720.webm
2.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.22.mp4
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/018-720.webm
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/30.mp4
2.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/24.mp4
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/3.mp4
2.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/35.mp4
2.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/5. Azure CDN Token Signing.mp4
2.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/9.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/19.webm
2.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/02.webm
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/23.webm
2.8 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/10.mp4
2.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/039-720.webm
2.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.3.mp4
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/007-720.webm
2.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/7.mp4
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/16.mp4
2.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/28. ABV Example.mp4
2.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/025-720.webm
2.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/15. Whats Draining the Battery.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/15.webm
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/054-720.webm
2.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/005-720.webm
2.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.15.mp4
2.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/001-720.webm
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/5.webm
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/3. Scenario and Start/2.mp4
2.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_6.webm
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/021-720.webm
2.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/016-720.webm
2.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/7.mp4
2.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/7. Our Approach.mp4
2.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/028-720.webm
2.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/10.mp4
2.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/030-720.webm
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/7.mp4
2.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/12.webm
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/022-720.webm
2.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/1. PowerShell Remoting/14.mp4
2.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/9. Objection Easy hooking 2.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/5.webm
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/8.mp4
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/007-720.webm
2.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/10.mp4
2.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/002-720_Malware_Memory_Forensics.webm
2.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/19. Forensic Scenarios Scene of a Crime.mp4
2.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/28.mp4
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/3.mp4
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/8.mp4
2.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/005-720.webm
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/19.mp4
2.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/11. Achievable 2.mp4
2.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/005-720.webm
2.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/005-720.webm
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/text/2019/414.5.pdf
2.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/34.mp4
2.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/010-720_Malware_Memory_Forensics.webm
2.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/9. Leadership Traits Attributes and Competencies.mp4
2.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/07.webm
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/10.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/27.webm
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/7.webm
2.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/43.mp4
2.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/013-720.webm
2.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.15.mp4
2.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/15. Is This a Good Mission Statement.mp4
2.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/11. Monitoring and Metrics for DevSecOps.mp4
2.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/12.mp4
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/29.mp4
2.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/9. GNU Strings Command.mp4
2.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/6. Application Storage.mp4
2.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/04.webm
2.8 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/9.mp4
2.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.3.mp4
2.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/002-720.webm
2.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/025-720.webm
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/21.mp4
2.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/23. Additional Authentication Providers.mp4
2.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/11. PCI DSS and DevOps Example.mp4
2.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/13.mp4
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/091-720.webm
2.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/15.mp4
2.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/5.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/17.webm
2.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/9. AnyTrans A Solution to Unlock the iOS Backup 2.mp4
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/7.mp4
2.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/14. Adding SAST to CodePipeline Find Security Bugs.mp4
2.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/004-720.webm
2.8 MB
SEC506 - Securing Linux-Unix/video/2011/Day 4 - Application Security/Extra/restorecon.ogv
2.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/19. Presentation Intros and Outros.mp4
2.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/14. iOS Binary Architecture.mp4
2.8 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/40.mp4
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/13.mp4
2.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/20. Example of Long but Clear Mission Goals.mp4
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/4.mp4
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/75.mp4
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/31.mp4
2.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.20.mp4
2.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/019-720.webm
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/14.webm
2.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.1.mp4
2.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/013-720.webm
2.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_10.webm
2.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.9.mp4
2.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/66. Security Business Case Traps.mp4
2.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/021-720.webm
2.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/13.mp4
2.8 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/013-720.webm
2.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/2.mp4
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/16.mp4
2.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/16.webm
2.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/6.mp4
2.8 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/2. Registry Forensic Analysis/6.mp4
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/046-720.webm
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/30.mp4
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/17.mp4
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/37.mp4
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/018-720.webm
2.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/15. Combining Data from Another Table.mp4
2.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/15. Dirty Cow Exploit.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/19.webm
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/38.mp4
2.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/9.mp4
2.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/30. Security Misconfiguration.mp4
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/009-720.webm
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.6.mp4
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/008-720.webm
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/015-720.webm
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/017-720.webm
2.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/023-720.webm
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/4.mp4
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/6.mp4
2.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/11. The Declarative Statement.mp4
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/012-720.webm
2.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/11. Mixed Voicing.mp4
2.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/10. Android IPC Exported Attribute.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/11.webm
2.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/6. ObjectiveC 101.mp4
2.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/17.mp4
2.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/4. Threats We Actually Care About 2.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/21.webm
2.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/001-720_Analyzing_Multi-Technology_Malware.webm
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/14. Git Workflow Visual Overview.mp4
2.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/28. What Treble Does Not Solve.mp4
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/10.mp4
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/16.webm
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/34.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/01.webm
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/12.webm
2.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/15.mp4
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/19.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.43.mp4
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/004-720.webm
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/14.mp4
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.3 - Web Framework Defenses/006-720.webm
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/13.mp4
2.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/005-720.webm
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/15. CALMS CultureVisible Signs of a DevOps Culture.mp4
2.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/30. Policy Structure.mp4
2.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/9. Empower People to Do the Right Thing.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/14. Securing Data at Rest Relational Database Service RDS.mp4
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/001-720.webm
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/8.webm
2.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/12.mp4
2.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/3. iCloud Extractions/3. Accessing iCloud Backup Files 1.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/13. Implementing the CIS Controls in DevOps 1.mp4
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/015-720.webm
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/008-720.webm
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/12.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/6. Checkpoint.mp4
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/27.mp4
2.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/006-720.webm
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/48.mp4
2.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/068-720.webm
2.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/62. ATTCK Use Cases.mp4
2.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/8. Personality Assessments Lead to Individual and Team Discovery.mp4
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/82.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.3.mp4
2.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/12. Hedgehog Concept.mp4
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/53.webm
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/13.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.7.mp4
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/33.webm
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/017-720.webm
2.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/023-720.webm
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/1.mp4
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/21.webm
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/7. Distributed Systems/2.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.1 INTRODUCTION TO ESSENTIAL SKILLS WORKSHOP/07.webm
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/010-720.webm
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/13. EC2 Instances Update DNS.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.13.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/6. Code Fix for Broken Access Control.mp4
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/17.mp4
2.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.7 HTTP SYNTAX AND MESSAGING/SEC542- SANS OnDemand_3.webm
2.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/12. Analysis and Response/2.mp4
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/093-720.webm
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/11. BlueGreen Deployment AKS.mp4
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/048-720.webm
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/1. Security Assessment Strategies/5.mp4
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/5.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.12.mp4
2.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/024-720.webm
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/4.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/13.webm
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/22.webm
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/53.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/06.webm
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/7. Kubernetes Security.mp4
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/6.mp4
2.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_7.webm
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/35.webm
2.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/018-720.webm
2.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/24.mp4
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/4.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/23. Direct KMS Encryption.mp4
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/12.mp4
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/40.mp4
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/012-720.webm
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.34.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/14.webm
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/34. CloudFormation Resource Example.mp4
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/45.mp4
2.7 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/32.mp4
2.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/20. Custom Recovery Image.mp4
2.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/3. Course Roadmap 2.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/29. Unit Testing for Security Alert on HighRisk Code Changes.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/3. What Is Infrastructure as Code.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/05.webm
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/3.webm
2.7 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/085-720.webm
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/46.mp4
2.7 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/25.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/20. Jenkins Continuous Integration and Delivery.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/02.webm
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/15.mp4
2.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/3. Collecting User Information/4.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.4.mp4
2.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/8. Using Python to Parse BLOBs.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.5.mp4
2.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/011-720.webm
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/10.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/03.webm
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/006-720.webm
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/15.webm
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.105.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2019/560.6.pdf
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/4.mp4
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/006-720.webm
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/015-720.webm
2.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/021-720.webm
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/14.mp4
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/18.webm
2.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/10. iOS Code Signing.mp4
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/004-720.webm
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/005-720.webm
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/9.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/28. Container Security Hardening Basics Specifically for Docker.mp4
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/22.mp4
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/010-720.webm
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/20.mp4
2.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand_7.webm
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.59.mp4
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/3.webm
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/036-720.webm
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/5.mp4
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/2.webm
2.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_04.webm
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/9.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.33.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.12.mp4
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/13.mp4
2.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_4.webm
2.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/003-720.webm
2.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/16.webm
2.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/42.mp4
2.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/44.mp4
2.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/001-720_2.webm
2.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/5.mp4
2.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/17. Ending Your Lab.mp4
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/12.webm
2.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/002-720.webm
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.37.mp4
2.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.33.mp4
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/19. Creating a WAF Rule CSRF.mp4
2.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/11.mp4
2.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/003-720.webm
2.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/7.webm
2.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/8. CloudWatch Log Insights.mp4
2.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/006-720.webm
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/004-720.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/9.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.2.mp4
2.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/004-720.webm
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.5.mp4
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/30. Maturity Models.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/7.webm
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/38.webm
2.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/28.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/7.webm
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/49. Jashopper Case Summary.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/25.webm
2.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/11.mp4
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/20. iOS Binary Disassembly.mp4
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/79. Current State of Security.mp4
2.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/1. Smartphone Overview Fundamentals of Analysis SQLite.mp4
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/49. Application Security Vulnerability Management Open Source.mp4
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/23.webm
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.77.mp4
2.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/022-720.webm
2.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/1. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction.mp4
2.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/5.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/15.mp4
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/026-720.webm
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/01.webm
2.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/6.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/3.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/27.mp4
2.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_12.webm
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.102.mp4
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/8. Serverless and Application Security.mp4
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/005-720.webm
2.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/6. Dont Overlook Data BLOBs.mp4
2.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/16. Placing the User At the Scene of the Crime 1.mp4
2.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/17. TABLE JOINS.mp4
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/031-720.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/15.mp4
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/23. Effective Unit Testing for Security.mp4
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/10.webm
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/041-720.webm
2.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/5.mp4
2.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/3. Motivation and Introduction/6.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.34.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/4.mp4
2.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/10.mp4
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/016-720.webm
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/004-720.webm
2.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/12.mp4
2.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/038-720.webm
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/10.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/18.mp4
2.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/001-720.webm
2.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/5. Edge Overview/4.mp4
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/25. Conflict Resolution.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/15.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/33.webm
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/20.webm
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/13.webm
2.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/3.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/33.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.2 Sniffing with tcpdump/SEC560 - 2.2.6.mp4
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/11.webm
2.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/46.mp4
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/17. iOS Malware.mp4
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/006-720.webm
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/002-720.webm
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/2. Content Delivery Network CDN.mp4
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/22. Balanced Scorecard.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.7.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/15.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.17.mp4
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/81. Set a Target.mp4
2.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/40.mp4
2.6 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/25.mp4
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/12. BLU R1 HD Root Process 5.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/30.webm
2.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/2. The Donald Blake Case/3.mp4
2.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/7.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/2.mp4
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/028-720.webm
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/59. Crown Jewels and Business Assets.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/13.mp4
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/59. Mobile Legal Liability.mp4
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/02.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/29.mp4
2.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/4. Example Stagefright Android OS.mp4
2.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/007-720.webm
2.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/34.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/10.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/14.mp4
2.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/055-720.webm
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/8. Needle Storage Modules.mp4
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/012-720.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/14.mp4
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/07.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/3.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.13.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.95.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/45.webm
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/009-720.webm
2.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/4.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/21.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/25.webm
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/017-720.webm
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/002-720.webm
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/11. Container Security Issues.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/8.mp4
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/012-720.webm
2.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_9_2.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/44.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/10.webm
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/14. Tip 1 Use Strings.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.9.mp4
2.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/013-720.webm
2.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/3.mp4
2.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/4.mp4
2.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/16.mp4
2.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_8.webm
2.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/10.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.20.mp4
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/15. Deployment Techniques.mp4
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/19. Purpose Example Access Control.mp4
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.3 PYTHON AND pyWARS/01.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/22.mp4
2.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_3_3.webm
2.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/013-720_Analyzing_Multi-Technology_Malware.webm
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/3. Course Roadmap.mp4
2.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/9. Collection of Smartphones as Evidence.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/3.mp4
2.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_02.webm
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.4.mp4
2.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/26.mp4
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/011-720.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/6.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.20.mp4
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/16. Automating Compliance Checking Chef Automate.mp4
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/20. STS Enterprise Federation Example.mp4
2.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/016-720.webm
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/73. Secure Development Guidelines.mp4
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/9. Risk Assessments and Threat Modeling Challenges.mp4
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/012-720.webm
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/20. Tips for Your Security Team.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/31.webm
2.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/11. Exercise Closure/2.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/25.webm
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/009-720.webm
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/5. Infrastructure as Code Testing.mp4
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/08.webm
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/3. Warning Early Software.mp4
2.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/15.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/4.mp4
2.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_17.webm
2.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/005-720.webm
2.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.2 TESTING SOFTWARE CONFIGURATION/SEC542- SANS OnDemand_5_2.webm
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/034-720.webm
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/11. Cydia Impactor.mp4
2.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/15. Conclusion for 564.1/1.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/19.mp4
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/17. Tink Assemblies.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.6.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/11.mp4
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/14.webm
2.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/019-720.webm
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/10.webm
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/7.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/16.mp4
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.1 Why Exploitation/SEC560 - 3.1.5.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/12.webm
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/8.mp4
2.6 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/10.mp4
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/12. VPC Flow Log CLI Example.mp4
2.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/035-720.webm
2.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.39.mp4
2.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/002-720.webm
2.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/10.mp4
2.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/13. SIM Card Identifiers.mp4
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/61. In Summary 3.mp4
2.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/7.mp4
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/004-720.webm
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/14. Security Investment Prioritization Challenges.mp4
2.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/5.mp4
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/18. CALMS Automate All the Things Everything as Code.mp4
2.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/23. AWS Trusted Advisor.mp4
2.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/006-720.webm
2.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/001-720.webm
2.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/09.webm
2.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/17.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/14.mp4
2.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/003-720.webm
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/23. Strategic Planning Outcomes.mp4
2.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/26. No Integrated Obfuscation.mp4
2.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/17.webm
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/23. Step 1 Tell a Story Example.mp4
2.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/3.mp4
2.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/17. United States SOX SarbanesOxley.mp4
2.5 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/30.mp4
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/7.webm
2.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_17.webm
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/5.mp4
2.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/060-720.webm
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/29.webm
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.8.mp4
2.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/004-720.webm
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/11.mp4
2.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/009-720.webm
2.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/006-720.webm
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/23.webm
2.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/6.mp4
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/8.webm
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/45.mp4
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/14. Database as Code Tooling.mp4
2.5 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/051-720.webm
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/12.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/26.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/13.mp4
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.9 John the Ripper/SEC560 - 4.9.2.mp4
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/4.mp4
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/12.webm
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/15.mp4
2.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/8. Was the Device Really There.mp4
2.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/51.mp4
2.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/4.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/4.mp4
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.33.mp4
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/29. CloudFormation Template Functions.mp4
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.3.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/27.mp4
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/12.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/44.mp4
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.15.mp4
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/17.webm
2.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/016-720.webm
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/19. CrossOrigin Resource Sharing CORS.mp4
2.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/35. Intel BYOD Case Summary.mp4
2.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/006-720.webm
2.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/002-720.webm
2.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/034-720.webm
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/85. OWASP AppSec Pipeline Integration.mp4
2.5 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/082-720.webm
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/8. Objection Easy hooking 1.mp4
2.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/26. Security Capability Dashboard Example.mp4
2.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/54. Example 2 Bad Exec Communication DMARC.mp4
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/6. Burp Suite Transparent Proxy.mp4
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/28. Security Considerations for CloudBased CICD.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/text/2019/487.6.pdf
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/7.mp4
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/19.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/10.mp4
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.20.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/20.mp4
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/19. Application Signing.mp4
2.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/1. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction.mp4
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.11.mp4
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/5. Commercial RATs Hacking Team.mp4
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/23.webm
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/21.mp4
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.6.mp4
2.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/05.webm
2.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/006-720.webm
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/19.mp4
2.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_14.webm
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/18.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/13.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/12.mp4
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/34.mp4
2.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/6.mp4
2.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/07.webm
2.5 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/33.mp4
2.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/6. Planning/3.mp4
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/7. Restricting Access to S3 Content.mp4
2.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/5. The Curious Case of Will.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/25.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/24.mp4
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/7. Basics of Secure Infrastructure as Code.mp4
2.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/10.mp4
2.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/22. Application Storage on SD Card or Media Directory.mp4
2.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/84. Challenges Identifying Crown Jewels.mp4
2.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/12.webm
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/text/2019/414.2.pdf
2.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/043-720.webm
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/5.webm
2.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/012-720.webm
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.4.mp4
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/27. Course Roadmap 2.mp4
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/67. Dynamic Scanning DAST in CICD Challenges.mp4
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/10.mp4
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/25.webm
2.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/015-720.webm
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/8. Simple Meterpreter Payload.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/2/6.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/13.mp4
2.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/005-720.webm
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/19. Terraform Command Line Interface CLI.mp4
2.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/28.webm
2.5 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/24.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/90.mp4
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/6. Tcpdump Packet Capture.mp4
2.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/5.mp4
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/39. Management Subnets.mp4
2.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/013-720.webm
2.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/52. In Summary 2.mp4
2.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/008-720.webm
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/9.mp4
2.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/011-720.webm
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/6. NETWORK SECURITY CONFIGURATION.mp4
2.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/04.webm
2.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/011-720.webm
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/103.mp4
2.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/017-720.webm
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/17. Google Voice Ez Texting.mp4
2.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.9.mp4
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/9.mp4
2.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/14. Unc0ver Jailbreak Postinstallation Configuration.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/8.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/5.mp4
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/14.mp4
2.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_10.webm
2.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/15.webm
2.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/17.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/6.mp4
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/12. Azure Functions Serverless.mp4
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/15.webm
2.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/002-720.webm
2.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/59. P romote Distribution Strategy.mp4
2.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/071-720.webm
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/17.webm
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/5.mp4
2.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/014-720.webm
2.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/003-720_Recognizing_Packed_Malware.webm
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/24.mp4
2.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_6_2.webm
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/22.webm
2.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/010-720.webm
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/9.mp4
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/24.mp4
2.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/04.webm
2.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/9.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/22.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/42.mp4
2.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/048-720.webm
2.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/2. Backup File Keychains.mp4
2.5 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/014-720.webm
2.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/26.webm
2.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/22. Unit Testing Example of a Simple Unit Test.mp4
2.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/21.mp4
2.5 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/39.mp4
2.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/54.webm
2.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/4.mp4
2.5 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/020-720.webm
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/12.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/12.mp4
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/089-720.webm
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/36. Secret Keepers Vault Configuration.mp4
2.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/009-720.webm
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/069-720.webm
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/14.webm
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/16.mp4
2.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/8. Remote Exploitation iOS and Android OS.mp4
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/15. Automating Complian ce Checking InSpec.mp4
2.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/012-720.webm
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/3.mp4
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/14.webm
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.6 Post-Exploitation Activities/SEC560 - 3.6.1.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/38.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/006-720.webm
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/9.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/8.mp4
2.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/12. Tips for Examining Uncommon Browsers.mp4
2.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/14.webm
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/27. Conflict Resolution Styles.mp4
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/38.mp4
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.21.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/11.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/16. Encourage Active Listening During Your Presentation.mp4
2.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.7 HTTP SYNTAX AND MESSAGING/SEC542- SANS OnDemand_2.webm
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.2.mp4
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/035-720.webm
2.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/12. Android Permission Definition.mp4
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/76.mp4
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/8. Secret Keepers OpenSource Solutions.mp4
2.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/13.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/012-720.webm
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.3.mp4
2.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/014-720.webm
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/42. Intel SWOT Analysis Strengths.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/19.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/15.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/43. S pecify Marketing Objectives.mp4
2.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/10. Jadx to Android Studio.mp4
2.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/037-720.webm
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/20. Code Owners Security Review for HighRisk Code Changes.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/23.mp4
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/14.mp4
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.3.mp4
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/25. Lab 33 Monitor with Dashboards.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/5. iPremier Case A Debrief.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/007-720.webm
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/11.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/30. Metrics Pitfalls To Avoid.mp4
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.16.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/002-720.webm
2.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/8.mp4
2.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/5.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/010-720.webm
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/28.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/28. Maintaining Trust Is Key to Relationship Management.mp4
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/30. Security Challenges in DevOps Technology.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/8.mp4
2.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/12. Trusting Burps Certificate on iOS.mp4
2.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/37. Debug Detection 2.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/005-720.webm
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/058-720.webm
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/015-720.webm
2.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_14.webm
2.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/3.mp4
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.12.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/006-720.webm
2.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/14.mp4
2.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/11.mp4
2.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/4. SQLite Deletion.mp4
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/57.webm
2.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/003-720.webm
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/28. Identify Risks.mp4
2.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/11. Android SQLite DB.mp4
2.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_11.webm
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/025-720.webm
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/48. Gap Analysis Current and Future State.mp4
2.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/12.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/33.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/017-720.webm
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/25.mp4
2.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/16. Perapp ThirdParty App Installation Permission.mp4
2.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/10.mp4
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/4.webm
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/1.mp4
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/31.webm
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/007-720.webm
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/38. NIST SP 80053.mp4
2.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_7_2.webm
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/020-720.webm
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/16.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/23.mp4
2.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/056-720.webm
2.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/011-720.webm
2.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/3. Beyond the Tools Locating Application Data 2.mp4
2.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/4.mp4
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.4.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/009-720.webm
2.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/3. Android Device Components.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/5.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/009-720.webm
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/007-720.webm
2.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/017-720.webm
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/14. AWS WAF Security Automations.mp4
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.22.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/009-720.webm
2.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/13. Evolution of Mobile Malware Threats.mp4
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/007-720.webm
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.4.mp4
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/11.webm
2.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_4_2.webm
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/21.mp4
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/2. DevOps Deployment Kata.mp4
2.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/6. Google Cloud Extractions and Analysis/6. Android Summary 1.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/7.mp4
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/7.mp4
2.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/15. Android Internal and External Storage.mp4
2.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/5.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/5.mp4
2.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_11.webm
2.4 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/58.mp4
2.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/012-720.webm
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/16.mp4
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/4.webm
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/12.webm
2.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/5. Persistence/5.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/3. Groups Versus Teams.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/45. Example 1 Illegal Drugs.mp4
2.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/7.mp4
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/025-720.webm
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/10.mp4
2.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_3.webm
2.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/13.webm
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/5.mp4
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/22. Considerations in Using Jenkins for CD.mp4
2.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/11.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/29. Lab 21 Highlight Keywords.mp4
2.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/5.mp4
2.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/8.mp4
2.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/033-720.webm
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/8. Nonverbal Behaviors of Communication.mp4
2.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/025-720.webm
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/014-720.webm
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/14.webm
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/6. Azure Log Analytics.mp4
2.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/3. Motivation and Introduction/4.mp4
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/024-720.webm
2.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/21. Was the Device in Use.mp4
2.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/3. iCloud Extractions/2. Cloud Extraction Techniques.mp4
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.9 John the Ripper/SEC560 - 4.9.6.mp4
2.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/18. NetworkConnections Artifacts.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/57. MultiYear Security Roadmap Example.mp4
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/text/2019/414.6.pdf
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/17.webm
2.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/34.webm
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/11.mp4
2.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/002-720.webm
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.30.mp4
2.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/044-720.webm
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/64. CD ProvisionConfigure Test System.mp4
2.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/9.mp4
2.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.7.mp4
2.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/3. How Specific Should Policy Be.mp4
2.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/19.mp4
2.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_5_3.webm
2.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/11.mp4
2.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/13. AWS Identity and Access Management IAM.mp4
2.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/24.webm
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/6.mp4
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/005-720.webm
2.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.5-Command Injection/SEC542- SANS OnDemand_5.webm
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/16.mp4
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/013-720.webm
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/3.mp4
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/6. iOS Keychain Accessibility Attribute.mp4
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/2. Needle.mp4
2.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/2. Smartphones Considerations.mp4
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/4. Android Files.mp4
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/022-720.webm
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/11.webm
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/9.mp4
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/25. Burp Suite Repeater Transaction Manipulation.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/15.mp4
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/015-720.webm
2.3 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/25.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/10.mp4
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/38.mp4
2.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/17.mp4
2.3 MB
SEC573 - Automating Information Security with Python/text/2020/573.6.pdf
2.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/21. PureSec FunctionShield Nodejs Example.mp4
2.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/5. iTunes vs iCloud.mp4
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/4.webm
2.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/15. Location Information 1.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/18.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/25.mp4
2.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/025-720.webm
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/015-720.webm
2.3 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2019/SEC617.6 - Capture the Flag Event.pdf
2.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.7 INFORMATION LEAKAGE/SEC542- SANS OnDemand_5_3.webm
2.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/15.mp4
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/37.webm
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/009-720.webm
2.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/1. Course Roadmap 1.mp4
2.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/4.mp4
2.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/16.mp4
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/014-720.webm
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/16.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/4.mp4
2.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/005-720.webm
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/73.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/16. One or Many.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/40.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/10. Communication in Meetings.mp4
2.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/29.webm
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/36. Step 3 Prioritize Stakeholders.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/13.mp4
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/003-720.webm
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/18.webm
2.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.26.mp4
2.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.42.mp4
2.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/12. Analysis and Response/4.mp4
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/009-720.webm
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/text/2019/575.6.pdf
2.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/13. Accounting for Timestamps.mp4
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/24.mp4
2.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/09.webm
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/13.webm
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/10.mp4
2.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_08.webm
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/25. Overview 2.mp4
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/13. SSL Kill Switch.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/23. Five Forms of Leadership Power.mp4
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/009-720.webm
2.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/006-720.webm
2.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/33. Security in CD Manual Code Reviews.mp4
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/20.webm
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/026-720.webm
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/27.mp4
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/020-720.webm
2.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/23. ThirdParty Communication Applications.mp4
2.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.66.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/10.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/8.mp4
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/3.mp4
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/12.mp4
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/1. Static Application Analysis/2. Table of Contents.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/14. Consistency.mp4
2.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/4.mp4
2.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/34. Secret Keepers Vault Secrets Engines.mp4
2.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.55.mp4
2.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/6. Recommended Acquisition Guide.mp4
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.3 - Web Framework Defenses/009-720.webm
2.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/27. Cloud Custodian CloudWatch Event Log.mp4
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/10.webm
2.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_13.webm
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/2.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/32. Understand Stakeholder Motivations.mp4
2.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/9. AWS Root User Account.mp4
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/22.mp4
2.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/032-720.webm
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/024-720.webm
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/075-720.webm
2.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.9 John the Ripper/SEC560 - 4.9.5.mp4
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/011-720.webm
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/5.mp4
2.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_13_2.webm
2.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/005-720.webm
2.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_15.webm
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/9.mp4
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/7.webm
2.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/11. Reconnaissance/4.mp4
2.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/06.webm
2.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/006-720.webm
2.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/014-720_Recognizing_Packed_Malware.webm
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/7.mp4
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/002-720.webm
2.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/37. Lab Secrets Setup.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/71. Secure Development Standards.mp4
2.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/001-720_Getting_Started_with_Unpacking.webm
2.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/6.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/3. Define Approval Process.mp4
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/8.webm
2.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/005-720.webm
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/016-720.webm
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/2. Security Evaluation Models/4.mp4
2.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_13.webm
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/013-720.webm
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/009-720.webm
2.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/011-720.webm
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/3. Scenario and Start/4.mp4
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/035-720.webm
2.3 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/011-720.webm
2.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/19.webm
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/2.mp4
2.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/010-720.webm
2.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/8. Rules of Engagement/4.mp4
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/19.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/13.mp4
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/6. Obfuscation Scope.mp4
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/9. JetBrains dotPeek.mp4
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2019/642.6.pdf
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/7. Bold Like Us BLU R1 HD.mp4
2.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/002-720.webm
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/8.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/9. Is This a Good Vision Statement.mp4
2.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/10.mp4
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/15.mp4
2.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/24. KMS SDK.mp4
2.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.14.mp4
2.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/016-720.webm
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/34. Tips for Creating Successful Policy.mp4
2.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/010-720.webm
2.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/001-720.webm
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/7.mp4
2.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/7.mp4
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/9.webm
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/17.webm
2.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/009-720.webm
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/42.mp4
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/23.mp4
2.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/37.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/7.mp4
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/22.mp4
2.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/3. SQLite Temporary Files.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/9.mp4
2.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/9.mp4
2.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/20. AWS Core Building Blocks.mp4
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/18.webm
2.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/18.mp4
2.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/19.webm
2.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_12_2.webm
2.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.2 LOGIC ATTACKS/SEC542- SANS OnDemand_2_2.webm
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/35. Lab 21 Solution Draft the Mission.mp4
2.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/12. Social Engineering/2.mp4
2.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.12 HEART BLEED/SEC542- SANS OnDemand_4_2.webm
2.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/28.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/56. Business Email Compromise.mp4
2.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/8. MobSF reports.mp4
2.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/65. Detailed Industry Comparison Example.mp4
2.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/20.mp4
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/35.mp4
2.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/3. Federated and Cloud Identity/8.mp4
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/43.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/22.webm
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.32.mp4
2.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/2. The SIFT Workstation/4. Tools Tools Tools.mp4
2.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/3. Manually Decoding SMS and iMessages.mp4
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/70.mp4
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/2.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/2.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.9.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/41. Marketing for Security.mp4
2.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/011-720.webm
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.14.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/16.webm
2.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/023-720.webm
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/6.mp4
2.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/013-720.webm
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/33.mp4
2.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_03.webm
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/9.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.47.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/2.mp4
2.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/008-720.webm
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/7.mp4
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/10. SQLite Data Decoding SMS.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.4.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/8.mp4
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/9. Android Studio.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/13. Mentoring Tips.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/012-720.webm
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/30.mp4
2.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/001-720_Debugging_Packed_Malware.webm
2.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/8. Rules of Engagement/6.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/62.mp4
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/021-720.webm
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/14.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/12. Coaching Tips.mp4
2.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_5.webm
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/17.webm
2.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.3 PROCESS EXECUTION/05.webm
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/2.mp4
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/7.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/56.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/3.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/12.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/31.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/9.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/012-720.webm
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.4.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/015-720.webm
2.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/5.mp4
2.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/005-720.webm
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/10. Centrally Configure CloudTrail.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/41.webm
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/20.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/62. Strategic Planning Outcomes.mp4
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/6. Rooting Android through Exploits.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/39.mp4
2.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/11.mp4
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/15. Adding SAST to CodePipeline Test Stage.mp4
2.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/012-720.webm
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/30. Sam Walton on Customers.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/45.mp4
2.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/042-720.webm
2.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/4.mp4
2.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/2.mp4
2.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/11.mp4
2.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/29. Analyzing Mobile Applications.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/15.webm
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/5.webm
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/13.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/1/6.mp4
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/5. iOS Apps.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/002-720.webm
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/42.mp4
2.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/6.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.8.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.13.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/010-720.webm
2.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.7 INFORMATION LEAKAGE/SEC542- SANS OnDemand_2.webm
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/13.mp4
2.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/26.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/10. Employee Engagement and Performance Tips.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/009-720.webm
2.2 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/18.mp4
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/003-720.webm
2.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_15.webm
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/21.webm
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/41.webm
2.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/1. iOS Forensics Overview/5. Application Sandboxing.mp4
2.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/4.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/14.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.16.mp4
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/9. Reminder Swift.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/14.mp4
2.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/24. Recommendations How to Handle All of This Data.mp4
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/13. Android Runtime Permissions.mp4
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/028-720.webm
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/5. Android IPC Services.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/4. Security Metrics Overview.mp4
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/015-720.webm
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/46.mp4
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/5. Summary/2. Security Changes with DevOps and Cloud Use CD.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/5.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.5.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.15.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.8.mp4
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/14. EC2 Key Pairs.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/5.webm
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/6. Jadx Example.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/24. Responsible Parties.mp4
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/5.mp4
2.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.1 INTRODUCTION TO ESSENTIAL SKILLS WORKSHOP/04.webm
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/24.webm
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/17.mp4
2.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/28.webm
2.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/4. CACHE Evidentiary Locations.mp4
2.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/37.mp4
2.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/001-720_Using_Debuggers_for_Dumping.webm
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/41.mp4
2.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/2. Private Key Security Best Practices/1.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/014-720.webm
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/020-720.webm
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/31. iExplorer Data.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/31.webm
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/007-720.webm
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/17.mp4
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/023-720.webm
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/17.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/32.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/20.webm
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/21. In Summary 1.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/12. Ransom Notice.mp4
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/9.mp4
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/9. Security in CodePipeline SAST with Lambda.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/10.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/52.mp4
2.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/12.mp4
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/14.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/38.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/13.mp4
2.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/012-720.webm
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/6. About VERIS.mp4
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/005-720.webm
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/18.webm
2.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/012-720.webm
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/008-720.webm
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/3.mp4
2.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_3.webm
2.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.2 DOCUMENT OBJECT MODEL/SEC542- SANS OnDemand_5_2.webm
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/25.webm
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/20. ADB Service Target.mp4
2.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.94.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/41.webm
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/2. Configuration Management Tooling.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/17.webm
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/5.webm
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/12.mp4
2.2 MB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/004-720.webm
2.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/4. Are You Getting ALL of the Geolocation Data.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/5.mp4
2.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/28.mp4
2.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/6. Planning/8.mp4
2.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/1/4.mp4
2.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_01.webm
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/9.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/15.webm
2.2 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.3 TUPLES/01.webm
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/45. A udience Identify Target Market.mp4
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/27.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/5.mp4
2.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/23.webm
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/49. Risk Definitions.mp4
2.2 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/7.mp4
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/6. Internet of Things and SCADA/7.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/004-720.webm
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/21.mp4
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/16.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/013-720.webm
2.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/008-720.webm
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/1. Background/6. Notes on the Case Studies.mp4
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/019-720.webm
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/2. Reverse Engineering Obfuscated Applications.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/13.mp4
2.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/8. Rules of Engagement/2.mp4
2.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/5.mp4
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/025-720.webm
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/24. AWS Config.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/074-720.webm
2.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_16.webm
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/18. CIS Azure Benchmarks InSpec Azure Resource Pack.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/8. Why Dont People Follow the Rules.mp4
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/37. Step 3 Prioritization Example.mp4
2.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/056-720.webm
2.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/4. Needle Binary Modules.mp4
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/3. Lab Environment Overview.mp4
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/31. Security Challenges in DevOps Integrity and Availability.mp4
2.2 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/34.mp4
2.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/004-720.webm
2.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/002-720.webm
2.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/72.mp4
2.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/21. Container Security OpenSource Docker Scanners.mp4
2.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/008-720.webm
2.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/002-720.webm
2.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/20. Example Stakeholders.mp4
2.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/091-720.webm
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/27.webm
2.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/18. Installing IPA Files.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/16.webm
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/45.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/12.mp4
2.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_041_Recognizing_Packed_Malware/009-720_Recognizing_Packed_Malware.webm
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/42. CloudFormation EC2 User Data.mp4
2.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/8. Android Backups/2. Android Backup Files.mp4
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/070-720.webm
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/66.mp4
2.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/7.mp4
2.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/45.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/5.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/15.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/12.mp4
2.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/8. Rules of Engagement/5.mp4
2.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/8. Rules of Engagement/7.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/39.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/3.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/14.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/23. CodePipeline Continuous Integration and Delivery.mp4
2.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/9.mp4
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/24. Translating Security Vision and Strategy.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/5.mp4
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/015-720.webm
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/19. Git Code Owners.mp4
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/017-720.webm
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/009-720.webm
2.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/1.mp4
2.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/23.mp4
2.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/008-720.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/7.mp4
2.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/8.mp4
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/005-720.webm
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/003-720.webm
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/31. Azure API Management.mp4
2.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_12.webm
2.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/5. Physical Analyzer Installed Application Views.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/26.mp4
2.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/5.mp4
2.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/12.mp4
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.18.mp4
2.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/24. Anatomy of Application Files iOS.mp4
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/006-720.webm
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.16.mp4
2.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/017-720.webm
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/10. What Is Important to iPremiers Business.mp4
2.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_02.webm
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/33.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/26.webm
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/4. Maslows Hierarchy of Needs.mp4
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.42.mp4
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/25. Step 3 Group the Big Ideas Example.mp4
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/053-720.webm
2.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/2.mp4
2.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/2.mp4
2.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/10. Burp Suite Proxy Capture.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/26.mp4
2.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/15.webm
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.6.mp4
2.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_10.webm
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/20.webm
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.96.mp4
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/042-720.webm
2.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/11.mp4
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/63. Unbundling Example.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/9.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/14. CloudFront and S3 Server Access Logs.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/28.webm
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/005-720.webm
2.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_11.webm
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/013-720.webm
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/004-720.webm
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/82. Provide Options.mp4
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/36. FFIEC CAT Maturity Levels.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/36. EC2 Security Groups.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/19.webm
2.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/27.mp4
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/008-720.webm
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/043-720.webm
2.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/16. Dropbox Plist File Example.mp4
2.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/17. iOS Software Maintenance.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/9.mp4
2.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/5. Persistence/3.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/26. Unit Testing for Security Logon Example Happy Path.mp4
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/057-720.webm
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/4. Hunt the Bug SQL Injection.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/24.webm
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/46. Example 2 Weapons and Firearms.mp4
2.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/26. Project Treble.mp4
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/008-720.webm
2.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/8.mp4
2.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/014-720_Analyzing_Multi-Technology_Malware.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/6.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/16.mp4
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/003-720.webm
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/26. Container Security Docker Hosts.mp4
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/022-720.webm
2.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/23.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/9.webm
2.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/39.mp4
2.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/21.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/10.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/35.webm
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/13.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/3.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/3.mp4
2.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/36. Frida CLI Device Interaction.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/28.mp4
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/008-720.webm
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/002-720.webm
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/29. Simple Systems Manager SSM Parameter Store Example.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/2.mp4
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/009-720.webm
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/15.webm
2.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.2 DOCUMENT OBJECT MODEL/SEC542- SANS OnDemand.webm
2.1 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/2.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/9.webm
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/6.webm
2.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_16.webm
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/27. Current State of BYOD at Intel.mp4
2.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/37.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/5.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/5. Docker Ecosystem.mp4
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/082-720.webm
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/11.mp4
2.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/6. Planning/6.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/26.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/33.mp4
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/001-720.webm
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/21.webm
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/18. AttackDriven Defense.mp4
2.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/7. Elcomsoft BruteForce Results.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/23.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/27. Unit Testing for Security Logon Example IAMROOT.mp4
2.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_6.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/5.mp4
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/021-720.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/12.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/4. Metrics Data Flow.mp4
2.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_2.webm
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/56. Organization Mission.mp4
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/019-720.webm
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.93.mp4
2.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_12.webm
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/1. Course Roadmap.mp4
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/31. Enterprise Strategy Group ESG Security Maturity Model.mp4
2.1 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/27.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/17.mp4
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.13.mp4
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/001-720.webm
2.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/11.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/61.mp4
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/021-720.webm
2.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/4.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/8.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/31.mp4
2.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/35. Frida Application Interaction.mp4
2.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.1 INTRODUCTION TO ESSENTIAL SKILLS WORKSHOP/05.webm
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.9.mp4
2.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.3 COURSE LOGISTICS/SEC542- SANS OnDemand_3.webm
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/18.webm
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.45.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/35.webm
2.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/3. Using Needle.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/44.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/14. Handling Secrets in Docker.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/13. Databases in DevOps.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/21. Preflight CORS Example.mp4
2.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/003-720.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/20.mp4
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/033-720.webm
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/080-720.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/20.mp4
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/71. Strategy Maps.mp4
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/003-720.webm
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/9.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/3.mp4
2.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/7. Android Forensics Overview/8. Secure Boot vs Secure Start Up.mp4
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/72. Secure Development Standards Protecting Data.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/21.mp4
2.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_10.webm
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/12. Infrastructure Discovery osquery and OSQL.mp4
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/006-720.webm
2.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/12. Msfvenom Payload Template.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/14. Azure Key Vault Storing Secrets.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/12. DevOps Continuous Delivery and ITIL.mp4
2.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/59.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/23. Cloud Custodian Policy File.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/7. ClientSide Encryption 1.mp4
2.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/6. CloudFront Origin Access Identity.mp4
2.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_18.webm
2.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/12. Fundamentals for Handling People.mp4
2.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/018-720.webm
2.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/20.mp4
2.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/11.mp4
2.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/020-720.webm
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/29.webm
2.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.7.mp4
2.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/11.webm
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/18.webm
2.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/028-720.webm
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/12. Canned vs Custom Policies.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/17.mp4
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/5.mp4
2.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/23. HTTP Parameter Tampering.mp4
2.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/23.webm
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/14.webm
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/14.mp4
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/8.mp4
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_5_2.webm
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/19.webm
2.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/23.webm
2.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/004-720.webm
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/22. STS Web Identity Federation Example.mp4
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_6_2.webm
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/17.mp4
2.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/1. Introduction to Smartphone Overview Fundamentals of Analysis SQLite/1. Smartphone Overview Fundamentals of Analysis SQLite.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/1. Course Roadmap 1.mp4
2.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/078-720.webm
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/14. osquery Use Cases.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/15.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/2.mp4
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/24.webm
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_15.webm
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/11.mp4
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/20. Factors in Evaluating BlueGreen Deploy Options.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/8.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/21.mp4
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand_2.webm
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/17.mp4
2.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/003-720.webm
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/13.mp4
2.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/3. Remember Your Tools May Provide a Clue.mp4
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/28.webm
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/3.webm
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/26. AWS CLI EC2 DescribeSubnets.mp4
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/31. AWS Elastic Load Balancing.mp4
2.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/19. Internet History 1.mp4
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/8. Rules of Engagement/3.mp4
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.5-Command Injection/SEC542- SANS OnDemand_2.webm
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/24.webm
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/29. Security Culture.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/12.mp4
2.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/008-720.webm
2.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/07.webm
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/21.webm
2.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/16.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/52. Example 1 Bad Exec Communication Heartbleed.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/4. Stages of Change.mp4
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/7.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/4.mp4
2.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/002-720.webm
2.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_13.webm
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/22. Situational Leadership Model 2.mp4
2.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/21. Renamed Method openRandDataStream.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/9. Putting It All Together/4.mp4
2.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.12.mp4
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_13.webm
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/11. Azure Resource Manager ARM.mp4
2.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.41.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/18.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/7.mp4
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/4.mp4
2.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/29.webm
2.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/044-720.webm
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/38.mp4
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/6. DevOps Unicorns.mp4
2.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/11.mp4
2.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/3. Finally The Jailbreak and Exploit We Have Been Wanting.mp4
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_9.webm
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/12.webm
2.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/17.webm
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/14. Code to Create Signed URLs with a Custom Policy.mp4
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/69. Dynamic Scanning in CICD OWASP ZAP.mp4
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/25. Comparing RASP to WAFs.mp4
2.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.7.mp4
2.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/003-720.webm
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/25.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/28.mp4
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/22. Writing Clean Puppet Code Modules and Patterns 1.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/22.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/2.mp4
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/15.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/34. Maturity Model Example 1.mp4
2.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/032-720.webm
2.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/030-720.webm
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/20.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/5.mp4
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/16.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/22.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/3.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/4. The Three Es of Learning Development Activities.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/49. Goals of This Section.mp4
2.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/18. Tip 4 Use Go To Declaration.mp4
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/29.mp4
2.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/005-720.webm
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/33. CMMI Maturity Levels.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/19. Successful Reorganization.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/58. MITRE ATTCK Overview.mp4
2.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_09.webm
2.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/034-720.webm
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/3.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/22.mp4
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/16.mp4
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/62.webm
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/13. Azure Resource Manager ARM Considerations.mp4
2.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/009-720.webm
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/25. Dashboard Example.mp4
2.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/14. SD Cards Defined.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/65. DeTTCT Analysis Flow.mp4
2.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.20.mp4
2.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/005-720.webm
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/11.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/8.mp4
2.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/036-720.webm
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/12. Social Engineering/4.mp4
2.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/29. ExifTool.mp4
2.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/14. Ettercap Options.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/15.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/8.mp4
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/17.mp4
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/14.webm
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/8.mp4
2.0 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/14.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/15.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/20.mp4
2.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/06.webm
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/78. Fuzzing in Continuous Delivery.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/28. Intel BYOD SWOT Analysis.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/14. Hacking the Supply Chain 1.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/10. DRIVE the Vision.mp4
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/29. Container Security Limit Size of Images.mp4
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/17.mp4
2.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/024-720.webm
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_10.webm
2.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.29.mp4
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/83. OWASP AppSec Pipeline Project.mp4
2.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/08.webm
2.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.9.mp4
2.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/010-720.webm
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/2.mp4
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/9. Cloud Provider Comparison.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/5.mp4
2.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/12.webm
2.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.5.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/39. Time Management SelfDirection.mp4
2.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/008-720.webm
2.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/27. Container Security Hardening the OS Kernel.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/18.mp4
2.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/026-720.webm
2.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/029-720.webm
2.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/21. Encoding versus Encryption.mp4
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/5.mp4
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/6. Planning/9.mp4
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/13.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/50. Values At General Electric.mp4
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/7.webm
2.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/007-720.webm
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/39.mp4
2.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.30.mp4
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/20.webm
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/17.webm
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/1. About the Course/3.mp4
2.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/016-720.webm
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/10.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/19.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/14. Communication in Presentations.mp4
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/10.webm
2.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/017-720.webm
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/4. Stephen R Covey on Management and Leadership.mp4
2.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/004-720.webm
2.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/031-720.webm
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/11.mp4
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_9_2.webm
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_13.webm
2.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/5. Magisk Systemless Root.mp4
2.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/19.mp4
2.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/022-720.webm
2.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/17.webm
2.0 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/11.mp4
2.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/8. Android Backups/3. Android Backup Acquisition.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/3.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/1. Background/4. Strategic Planning Workshop 2.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/10.mp4
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_6.webm
2.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/007-720.webm
2.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/19. Device Identification Artifacts.mp4
2.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/008-720.webm
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/4.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/38. Measure and Enforce Compliance.mp4
2.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/6.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/52. Step 2 Map to Maturity Levels.mp4
2.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/31. Policy Assessment.mp4
2.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/022-720.webm
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/47.mp4
2.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.4 WEB APPLICATION PEN TESTER'S TOOLKIT/SEC542- SANS OnDemand_2_2.webm
2.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/7. Distributed Systems/6.mp4
2.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.3.mp4
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/84.mp4
2.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/33.mp4
2.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/7. Android IPC Broadcast Receivers.mp4
2.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/13.mp4
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/016-720.webm
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/36.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/6. Herzbergs Hygiene and Motivational Factors 2.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/3. Content Delivery Issues.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/17.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/34.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/23.webm
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/2.mp4
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/011-720.webm
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/9.mp4
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/37. Frida for NonRooted Devices.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/19.webm
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/7.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/40. SWOT Analysis.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/27.webm
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/012-720.webm
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/7.mp4
1.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/024-720.webm
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/39. Why We Need To Do SWOT Analysis.mp4
1.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/003-720.webm
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/14. Timestamp Is Determined and Applied.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/39.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/56.webm
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/32. Performance Reviews.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/1. Course Roadmap 1.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/2/3.mp4
1.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.5 USING SCAPY/11.webm
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/27.webm
1.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/101-720.webm
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/012-720.webm
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/11. Coaching Mentoring and Sponsorship.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/2. The Dark Web/3.mp4
1.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/24.webm
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/39.webm
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/12.mp4
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/004-720.webm
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/12.mp4
1.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_03.webm
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/10. Android Meterpreter Capabilities.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/6.webm
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/2. Understand DevOps and CD Before Securing Them.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/57.mp4
1.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/017-720.webm
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/11.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/9. Using Signed URLs and Cookies.mp4
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/026-720.webm
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/10.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/3. iOS File System Structures/3. File System Layouts.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/11.mp4
1.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.33.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/72. Wiring Security Attacks into CD.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/24.webm
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/81. Example Intangible Assets.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/18. Azure Application Gateway.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/25.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/30.webm
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/56. Protect Function Example Roadmap.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/33. Security Challenges in DevOps Compensating Controls.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/4. Lab VM Overview.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/59.webm
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/11.mp4
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/11.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/33.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/36.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/16.mp4
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/042-720.webm
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/028-720.webm
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/15. KMS Overview 1.mp4
1.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_15.webm
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/13.mp4
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/006-720.webm
1.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.6.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/6.mp4
1.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/15.mp4
1.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/030-720.webm
1.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.2 TESTING SOFTWARE CONFIGURATION/SEC542- SANS OnDemand_7_2.webm
1.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_9.webm
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/14. Emergency SOS.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/3. Geo Data Think Outside the Box.mp4
1.9 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/4.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/18.mp4
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/8. Android Fake Installers.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/30.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/2.mp4
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/067-720.webm
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/2.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/32. AWS API Gateway.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/24. Equifax Case.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/21.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/32. Attacker Motivations.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/16. Location Information 2.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/43. CloudFormation Resource EC2 Instance.mp4
1.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/017-720.webm
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/35.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/12. Extroverts and Introverts.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/18.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/2.mp4
1.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/004-720_Debugging_Packed_Malware.webm
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/5.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/10.mp4
1.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/014-720.webm
1.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_8.webm
1.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_13.webm
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/016-720.webm
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/011-720.webm
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/27.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/8.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/65.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/34.webm
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/105.mp4
1.9 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/004-720.webm
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/004-720.webm
1.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.2.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/10.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/60. ATTCK Technique Example.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/79.mp4
1.9 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/080-720.webm
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/3. CrossSite Scripting XSS Review.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/11. Location Services Settings.mp4
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/9. BLU R1 HD Root Process 2.mp4
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/9.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/40.webm
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/2.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/5.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/7. Enterprise DevOps Horses not Unicorns.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/3. Data Storage in AWS.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/28.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/11.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/5. Handling Locked iOS Devices/5. Grayshift GrayKeyCellebrite Premium.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/8.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/21. Application Storage on Device.mp4
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/11.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/17.mp4
1.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/15.webm
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/15. Monitoring Anomaly Detection.mp4
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/006-720.webm
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/024-720.webm
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/5.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/19.webm
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/68.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/8.mp4
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/42.mp4
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/10. BLU R1 HD Root Process 3.mp4
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/2. Rooting Android.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/23. HCL Basics Data Source.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/14. Voicing Summary.mp4
1.9 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/44.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/10.webm
1.9 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/14.mp4
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/016-720.webm
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/69. Application Security Issues.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/36. Configuring an API Gateway Custom Authorizer.mp4
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/20. SSL PINNING.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/7. Encryption Matters iOS 13.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/10.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/22.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/29. Measuring Maturity.mp4
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/014-720.webm
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/066-720.webm
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/8.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/28.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/12. Azure Kubernetes Service AKS.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/10.mp4
1.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.5.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/20.webm
1.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.22.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/3. Android File System Structures/1. Android Forensics Agenda.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/63. Business Case.mp4
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/11. Reconnaissance/1.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/32.webm
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/7.webm
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/7. Policy and Power.mp4
1.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand_5_2.webm
1.9 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/34.mp4
1.9 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/053-720.webm
1.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.21.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/16.mp4
1.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.12.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/46.webm
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/7.mp4
1.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/5. Whole Brain Learning Considerations.mp4
1.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.12.mp4
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/20.webm
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/5.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/2. Locked Android Devices/2. Android Lock Codes.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/13.mp4
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/008-720.webm
1.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/10.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/17. Location Information 3.mp4
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/4. Cydia Substrate.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/5. Continuous Delivery Pipeline.mp4
1.9 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/17.mp4
1.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/7.mp4
1.9 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/6.mp4
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/005-720.webm
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/3.mp4
1.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_7.webm
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/10.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/38.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/20.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/12.mp4
1.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_6.webm
1.9 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/6.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/9. Securing Data at Rest S3.mp4
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/10. Target Manipulation Collection and Exfiltration/5.mp4
1.9 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/2. Beyond the Tools Locating Application Data 1.mp4
1.9 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/29.mp4
1.9 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/015-720.webm
1.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.32.mp4
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/8. BLU R1 HD Root Process 1.mp4
1.9 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/7. BlueGreen Deployment.mp4
1.9 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/6.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/10.mp4
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/036-720.webm
1.9 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/029-720.webm
1.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_11.webm
1.9 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/54.webm
1.9 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/05.webm
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/015-720.webm
1.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/037-720.webm
1.9 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/8. iOS Data Storage.mp4
1.9 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/3.mp4
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/31.mp4
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/012-720.webm
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/11.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/16. Puppet Basics Major Components of Puppet.mp4
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/6.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/2.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/18.webm
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/20.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/16.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/33.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/47. Gap Analysis Sample Initiatives.mp4
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.3.mp4
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/010-720.webm
1.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/5. AXIOM Fundamentals/6. AXIOM Key Features 1.mp4
1.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/03.webm
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/4. Lab Environment Overview.mp4
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/003-720.webm
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/003-720 (1).webm
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_7.webm
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/10. Target Manipulation Collection and Exfiltration/6.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/10.webm
1.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/020-720.webm
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/36. Lab 12 PreCommit Security.mp4
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/14.mp4
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.7 Port Pivot Relay/SEC560 - 3.7.2.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/4.webm
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/15.webm
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/63. ATTCK Data Sources.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/7. The Cone of Plausibility.mp4
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_11.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/83.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/33.webm
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/37. Security Groups Public and Private Subnet.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/88. In Summary 4.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/18.mp4
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/043-720.webm
1.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/9. When Apps Dont Live Up to Their Expectations.mp4
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/032-720.webm
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/18. Terraform Provisioner.mp4
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.22.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/41.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/55.webm
1.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/16.webm
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_8.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/60.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/8. Purpose of a Vision Statement.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/13.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/2.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/11.mp4
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/002-720.webm
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/9.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/7.mp4
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/014-720.webm
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/4.webm
1.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/21.mp4
1.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.5/SANS OnDemand_09.webm
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.2.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/15.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/20.mp4
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/009-720.webm
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/26. Module Summary.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/26.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/2.mp4
1.8 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/2. Registry Forensic Analysis/7.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/27.mp4
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/3. Motivation and Introduction/2.mp4
1.8 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/36.mp4
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/4. Traditional Browser Certificate Trust.mp4
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/15. Xamarin Target App Tink.mp4
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/006-720.webm
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/9. Needle filesbinarycookies Module.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/10.mp4
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/9.mp4
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_7_2.webm
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/017-720.webm
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/1.mp4
1.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/08.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/49.mp4
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/017-720.webm
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/3.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/17. Examples of Disruptive Innovation.mp4
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/042-720.webm
1.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/2. Mobile Malware Threat.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/59.webm
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/19. Blake Mouton Managerial Model.mp4
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/5.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/7.mp4
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/18. TRIcKING USERS INTO INSTALLING ROOT Ca CERTS.mp4
1.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/026-720.webm
1.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/27.mp4
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/36.mp4
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.10.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/5.mp4
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/9. Android Shared Preferences.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/60. Lab 13 Automating Static Analysis.mp4
1.8 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/28.mp4
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_3.webm
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/1. Background/5. Case Study Method.mp4
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/001-720.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/80.mp4
1.8 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/10.mp4
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/007-720.webm
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/006-720.webm
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/033-720.webm
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/5.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/26.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/22.mp4
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/14.mp4
1.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/7.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/6.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/19.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/48.webm
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/021-720.webm
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_3_3.webm
1.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/3. Android File System Structures/2. Features of EXT4.mp4
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.11.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/22.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/44.webm
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/21. How to Store Passwords.mp4
1.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/006-720.webm
1.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/003-720.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/15.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/22.webm
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/3. iOS App Manipulation.mp4
1.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/13.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/12.mp4
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/015-720.webm
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/11.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/17.mp4
1.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/002-720.webm
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/23. Security War Games and Red Team Fire Drills.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/3.mp4
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/36.mp4
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/5. Persistence/4.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/16.mp4
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/006-720.webm
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/14.webm
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.4.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/48. CloudFormation Designer Interface.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/6.mp4
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/2. Objection.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/18.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/35.mp4
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/020-720.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/20.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/4.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/18.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/48. SAST Technology Landscape Language Support 2.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/55.mp4
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/18.mp4
1.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/016-720.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/19.mp4
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/002-720.webm
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.10.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/80. Elements of a Business Case.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/28. Unit Testing for Security Access Control.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/27.webm
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/007-720.webm
1.8 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/35.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/6.webm
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/12. AWS CLI Basics.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/6.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/34.webm
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/10.mp4
1.8 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/36.mp4
1.8 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/18. FileSystem Checksums.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/22.mp4
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_13.webm
1.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.4 LOG ANALYSIS TECHNIQUES/02.webm
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/2. Rules and Regulations/3.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/32. CloudFormation Mapping Example.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/1. Course Roadmap 1.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/40. CloudFormation IAM Policy.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/11. Expiration Date.mp4
1.8 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/8. Data Stream Carving/5.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/19. Lambda Layers Security.mp4
1.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/004-720.webm
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/28. Security Policy Governance Life Cycle.mp4
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/016-720_Code_Injection_API_Hooking.webm
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/009-720.webm
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_9.webm
1.8 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/028-720.webm
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/009-720.webm
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/005-720.webm
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/14. Implementing the CIS Controls in DevOps 2.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/41. ELB Security Policies.mp4
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/064-720.webm
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/15.webm
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/14. Metrics Programs Should Be Prioritized.mp4
1.8 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/8. Data Stream Carving/3.mp4
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_4.webm
1.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/15.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/3.mp4
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/5. Persistence/6.mp4
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/20.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/39. Why We Need Marketing.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/7. Stress Is a Major Hygiene Factor.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/2.mp4
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/12.mp4
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/15. The Power of Labels.mp4
1.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/003-720.webm
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/32. Docker Seccomp.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/23. CALMS Measurement Security Metrics.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/42.webm
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/17. Case Scenario.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/15.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/7.mp4
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/7.mp4
1.8 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/16.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/48.webm
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.92.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/3.webm
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/006-720.webm
1.8 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/30.mp4
1.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/015-720.webm
1.8 MB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/002-720.webm
1.8 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/029-720.webm
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/35.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/8.mp4
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.12.mp4
1.8 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/20.mp4
1.8 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/016-720.webm
1.8 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/13. The Japanese 5 Whys Technique to Find Root Cause.mp4
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/17. Managing Continuous Delivery at Capital One.mp4
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/001-720.webm
1.8 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/6. Google Cloud Extractions and Analysis/7. Android Summary 2.mp4
1.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_15.webm
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/32.webm
1.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/015-720.webm
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/50.webm
1.8 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.7/012-720.webm
1.8 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/9. Kubernetes Security Tools.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/10.mp4
1.8 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/07.webm
1.8 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/5.mp4
1.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.6.mp4
1.8 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/8.webm
1.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/8.mp4
1.8 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/28.mp4
1.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/008-720.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/2.mp4
1.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/10. MDMs and Why We Care.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/10.webm
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/4. Rvictl.mp4
1.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/025-720.webm
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_15.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/20.webm
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/20. Use Compelling Stories in Your Presentations.mp4
1.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/039-720.webm
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/5. App Transport security.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/32.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/24.mp4
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/012-720.webm
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/025-720.webm
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/8. Kubernetes Security Guides.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/8.mp4
1.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/017-720.webm
1.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/036-720.webm
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/50.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/14. Trusting Burps certificate on Android.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/8. Positive and Negative Voicing.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/87. Identify Crown Jewels Example.mp4
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/029-720.webm
1.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/3.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/10.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/9. Continuous Delivery CD.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/7. Course Roadmap 2.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/3.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/24.webm
1.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.4.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/11. Cycript Completion.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/14. Android Firebase DB.mp4
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/2.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/45. AWS CLI CloudFormation Deploy Stack.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/8. Sample Question 1.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/29.mp4
1.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/14.webm
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/5.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/4.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/10. Android XML Files.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/6.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/21.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/28. Simple Systems Manager SSM Parameter Store.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/6. iOS Application Interaction/5. Universal links Advantages.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/6.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/6. Needle Dynamic Modules.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/23.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/23.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/11.mp4
1.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/1. iOS Forensics Overview/2. SANS DFIR.mp4
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/1.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/104.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/11. Stakeholder Management.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/52. OneSentence Position Statement.mp4
1.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.3 PROCESS EXECUTION/06.webm
1.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/8.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/21. Global Impact.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/16. Alerting Grafana Raising a Slack Alert.mp4
1.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/1. iOS Forensics Agenda.mp4
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_7_2.webm
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/6.mp4
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/070-720.webm
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/24.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/9.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/2.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/9.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/7.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/5.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/7.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/24.mp4
1.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/16.webm
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/17. Extending SAST in CodePipeline Publish SAST Results.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/59. Lab 13 Core Values Debrief.mp4
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/7.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/22.webm
1.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/019-720.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/7.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/4.webm
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/13.mp4
1.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/012-720.webm
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/25.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/10.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/17.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/14. TimeBased 1.mp4
1.7 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/23.mp4
1.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/085-720.webm
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/004-720.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/9.webm
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/008-720.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/13.webm
1.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/017-720.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/18.webm
1.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/6. Smartphone Forensic Capstone Exercise/1. Smartphone Forensic Capstone Exercise/3. Your Goal.mp4
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/003-720.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/43.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/6.mp4
1.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/004-720.webm
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/55. Managing Vulnerable Dependencies Commercial Tools.mp4
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/3.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/35. AWS S3 Bucket Warning Notice.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/14.mp4
1.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.3.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/12.webm
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/5.mp4
1.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/001-720.webm
1.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/041-720.webm
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/10.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/34.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/40.webm
1.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_07.webm
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/16. Android Keystore.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/27.mp4
1.7 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/49.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/20.mp4
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/9.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/12.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/26. Lab 51 Blocking Attacks with WAF.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/5. iOS keychain.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/2. Confucius on Learning.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/62.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/5.mp4
1.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/009-720.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/22.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/6. Internet of Things and SCADA/3.mp4
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/072-720.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/8.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/27. Mddata Files.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/16. iOS keyboard cache.mp4
1.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/012-720.webm
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/21. Dr H James Harrington on Improvement.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/3.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/5. Edge Overview/6.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/12. In Summary 1.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/15.mp4
1.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/25. Bonus Locations Full File System Required.mp4
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_3_2.webm
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/8. Android Data Storage.mp4
1.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.31.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/12. iOS Privilege Model.mp4
1.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/042-720.webm
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/6.mp4
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/003-720.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/38.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/29.mp4
1.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/5. Locating Application Data.mp4
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/1. About the Course/5.mp4
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_5.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/32.webm
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/20.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/2. Rules and Regulations/4.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/2. The Donald Blake Case/4.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/8. Employee Engagement Versus Employee Satisfaction.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/17.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/7. iOS Keychain Dumper.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/26.webm
1.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/013-720.webm
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/021-720.webm
1.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.1.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/3. ManintheMiddle Attacks.mp4
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/12.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/9.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/17. Summarizing Personality Assessments.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/4.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/71. Cyber Threat Intelligence.mp4
1.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/16. Signs and Symptoms of Mobile Malware Infection.mp4
1.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/047-720.webm
1.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.26.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/23.mp4
1.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.13.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/7.mp4
1.7 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/23.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/3. Scenario and Start/5.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/15.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/18.webm
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.10 BURP INTRUDER/SEC542- SANS OnDemand_5_2.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/17.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/34. Duty to Monitor 2.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/5. Needle metadata Module.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/26. CloudHSM.mp4
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/017-720.webm
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_19.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/12.webm
1.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/035-720.webm
1.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.2 Sniffing with tcpdump/SEC560 - 2.2.3.mp4
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/7. Roles and Responsibilities/2.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/4.webm
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/39. CloudFormation IAM Role.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/9. File Metadata/3.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/32. Coercive Management Style.mp4
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_16.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/17.mp4
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_8_2.webm
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/14. Protect the Organization Comply with Laws and Regulations.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/51. Intel SWOT Analysis Debrief.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/7.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/31.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/22.mp4
1.7 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/8. Physical Analyzer Keyword Searching.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/18. Extending SAST in CodePipeline Jenkins Setup.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/6.mp4
1.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/019-720.webm
1.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/017-720.webm
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/6. Planning/5.mp4
1.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.78.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/21. Document History.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/7. Continuous Integration CI.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/21.webm
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/20. Keeping the Team Moving Forward 1.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/24. Android Fragmentation.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/4. Insecure Direct Object Reference Example.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/52.webm
1.7 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.4 DISTRIBUTING PYTHON AS EXE/06.webm
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/13.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/22. Decisive Leadership.mp4
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/14. Donald O Clifton on Strengths.mp4
1.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/009-720.webm
1.7 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/005-720.webm
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/39. Security in CD Commit Stage.mp4
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/12. Azure Resource Manager ARM Benefits.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/25.mp4
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/16.mp4
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/19. Bundled Exploit Delivery.mp4
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/20.webm
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_14.webm
1.7 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/8. iOS Static Analysis.mp4
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/020-720.webm
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/015-720.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/41.webm
1.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/15. TimeBased 2.mp4
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/12.mp4
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.4 WEB APPLICATION PEN TESTER'S TOOLKIT/SEC542- SANS OnDemand_5_2.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/19.webm
1.7 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/28.mp4
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/16.mp4
1.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_3_2.webm
1.7 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/5. Persistence/2.mp4
1.7 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/1. Introduction and Information/3.mp4
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/079-720.webm
1.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/011-720.webm
1.7 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/008-720.webm
1.7 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/6. Docker Editions.mp4
1.7 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/008-720.webm
1.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/57.mp4
1.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/034-720.webm
1.7 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/35.webm
1.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/019-720.webm
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.6 Web App Overview/SEC560 - 5.6.2.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/3. Motivation and Introduction/7.mp4
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.20.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/17.webm
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.2.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/19.mp4
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/003-720.webm
1.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_4.webm
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/007-720.webm
1.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.6 TIPS, SHORTCUTS AND GOTCHAS/04.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/36.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/18. Same Origin Policy.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/7.webm
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/008-720.webm
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/79. Business Innovation Approach.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/15.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/59.mp4
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.30.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/2. Drozer Framework.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/5.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/34.webm
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/6. Commercial RATs OmniRAT.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/19. Capital One Delivery Pipeline Governance.mp4
1.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_12.webm
1.6 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/44.mp4
1.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/12. Wifi Crash Logs.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/14.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/012-720.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/2.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/12.mp4
1.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_13.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/27.webm
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/033-720.webm
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/16.mp4
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/023-720.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/1. Introduction and Information/4.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/5. Hunt the Bug XSS.mp4
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.31.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/11. VPC Flow Logs.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/2.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/29.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/5.webm
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/26. Puppet Auditing and Reporting.mp4
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/008-720.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/16.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/007-720.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/15.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/40.webm
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/022-720.webm
1.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/018-720.webm
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/2.mp4
1.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/3.mp4
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/66. Organizational Position.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/4.mp4
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/003-720.webm
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/15. Metrics Hierarchy.mp4
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/063-720.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/30.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/14.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/16.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/18.mp4
1.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/13. Whats Draining the Battery.mp4
1.6 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/44.mp4
1.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/001-720.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/3.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/20.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/15.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/31.webm
1.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/03.webm
1.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/011-720.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/11.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/16.webm
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/16. Dangerous Permissions.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/008-720.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/2. The Dark Web/5.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/005-720.webm
1.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/006-720_Code_Injection_API_Hooking.webm
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.11.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/28.webm
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/019-720.webm
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.9.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/51.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/18.mp4
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/63. SNAP Marketing Tools to Leverage.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/10. S3 ServerSide Encryption Key Management.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/2. Reverse Engineering Thirdparty App Platforms.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/26.webm
1.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_21.webm
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/033-720.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/17.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/14.mp4
1.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/03.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/32.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/12.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/14.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/12. Launching Lab Exercises.mp4
1.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/21. EDL Emergency Download Mode.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/33. iOS Backup Password Reset Now Possible.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/14.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/102.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/5. Summary/3. Security Changes with DevOps and Cloud Embrace Change.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/7.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/13.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/13. Azure Key Vault 2.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/24.webm
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/2. Security in CD Production.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/19.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/18. classdump.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/27.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/16.webm
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/7. Objection Interacting with Telegram.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/24.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/47.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/13. iOS 12 Enhancements to USB Restricted Mode.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/18.mp4
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/39. Documentation Baseline.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/6. New Mobile Device Certificate Warnings.mp4
1.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.10 INTERCEPTION PROXIES/SEC542- SANS OnDemand_5_2.webm
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/29. EC2 Container Service ECS Overview.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/20.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/2.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/20.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/29.mp4
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/045-720.webm
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/45. How to Develop the Roadmap.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/3.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/11. AWS Security.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/4. User Credential Theft.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/005-720.webm
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/31. Stakeholder Identification Complete.mp4
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/010-720.webm
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/024-720.webm
1.6 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/16.mp4
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/28. Data Access.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/13.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/11.mp4
1.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_4.webm
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/17. Android Logs.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/016-720.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/4.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.5 - Crypto Exploit Concepts/006-720.webm
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.3 - Web Framework Defenses/003-720.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/19.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/6.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/1. Course Roadmap.mp4
1.6 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/2. The Donald Blake Case/6.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/018-720.webm
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/008-720.webm
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/2. What Are Secrets.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/28. Invoking Activities.mp4
1.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_18.webm
1.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/2. Why Install a ThirdParty Browser.mp4
1.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/10.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/27.webm
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/108-720.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/28.webm
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/12.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/004-720.webm
1.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.5 STRINGS/30.webm
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/22. AWS CLI EC2 Describe VPCs.mp4
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/6. Continual Learning Model Desired Behavior.mp4
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/53. Whose Values Are These.mp4
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/014-720.webm
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/54.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/8.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/31.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/18. EC2 Container Service ECS Swap ECS Service.mp4
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.6.mp4
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/64. DeTTCT.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/9.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/6.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/2.mp4
1.6 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/15.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/10.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/7.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/13.mp4
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/006-720.webm
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/006-720.webm
1.6 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.5 THE PYTHON DEBUGGER/09.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/1. Classify Information and Supporting Assets/5.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/3.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/7.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/11. Reconnaissance/6.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/21.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/17.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/3.mp4
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/55. Example 2 Better Exec Communication DMARC.mp4
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/006-720.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/15.mp4
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/009-720.webm
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.30.mp4
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/023-720.webm
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/028-720.webm
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/3.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/10.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/42. Static Analysis Minimize False Positives.mp4
1.6 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_19.webm
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/003-720.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/23.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/50.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/20.mp4
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/007-720.webm
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/008-720.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/20.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/4.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/9.mp4
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/18. Security Dashboard Example.mp4
1.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_18.webm
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.50.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/3.mp4
1.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/2. Why Chat.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/38.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/8.mp4
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/008-720.webm
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/14.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/69.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/10.mp4
1.6 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/006-720.webm
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/65. What Is a Business Case.mp4
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/109-720.webm
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/69. Business Case Options.mp4
1.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/021-720.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/29.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/40.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/9. CloudWatch Metric Filter.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/29. Cloud Custodian Lambda Function.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/21.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/10.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/4.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/20.webm
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/1. Course Roadmap 1.mp4
1.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_3.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/28.webm
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/9.webm
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/8.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/17.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/12. Amazon AWS Shared Responsibility Model.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/10.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/7. Roles and Responsibilities/6.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/17.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/29. Warning Yes Public Subnets are Public.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/4.mp4
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.8.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/6.mp4
1.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/11. Other Platforms Utilizing SQLite.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/5.mp4
1.6 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/083-720.webm
1.6 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/18.mp4
1.6 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/13.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/9.webm
1.6 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/3. iOS File System Structures/2. Whats APFS.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/005-720.webm
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/3. Federated and Cloud Identity/4.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/5.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/29.webm
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.5.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/6.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/16. SILEO App Store.mp4
1.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/4.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/24.webm
1.6 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/6.mp4
1.6 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/2.mp4
1.6 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/10. Ouija ChatterBotFactory.mp4
1.6 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/13.mp4
1.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/9.mp4
1.6 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/8.mp4
1.6 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/11.webm
1.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.18.mp4
1.6 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/22. DAST Cloud Scanning Technical Considerations.mp4
1.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/037-720.webm
1.6 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/26. Intel BYOD Case Review.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/56. Threat Analysis 2.mp4
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/023-720.webm
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/007-720.webm
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/11.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/11.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/28.webm
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/008-720.webm
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/26.webm
1.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/11.webm
1.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/2. Mobile Application Runtime Manipulation.mp4
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/36.mp4
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/013-720.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/5.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/22. Version Control Accessing CodeCommit Using SSH.mp4
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/001-720.webm
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/14.mp4
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.15.mp4
1.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/11. Alternative decompilers 1.mp4
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/014-720.webm
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/16.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/35. Code Review Description Templates.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/24.mp4
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/7.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/11.mp4
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/010-720.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/9.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/8.mp4
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/038-720.webm
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/27.mp4
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/70.mp4
1.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_06.webm
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/50.mp4
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/002-720.webm
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/005-720.webm
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/10. Building Gold Images Packer.mp4
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_9.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/3.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/28.webm
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/56. Example 3 Bad Exec Communication DDoS.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/38. Lab 34 Secrets Management.mp4
1.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/27. Best Practices for iOS Analysis.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/12.webm
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/071-720.webm
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/9.webm
1.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/8. Provider or Service Messages.mp4
1.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/014-720.webm
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/003-720.webm
1.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/35.webm
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/009-720.webm
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/6.mp4
1.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/9. iOS 12 Jailbreak Unc0ver.mp4
1.5 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_03.webm
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_5.webm
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/33.mp4
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_8_2.webm
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/35.webm
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.4.mp4
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/78.mp4
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/46.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/13.mp4
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/43.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/8.webm
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/4.mp4
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/020-720.webm
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/16.mp4
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/6.mp4
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/094-720.webm
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/41. Strengths.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/24.webm
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/70. Secure Development Policy Statement.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/11.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/15.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/16.webm
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/005-720.webm
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/24. Step 2 Highlight Keywords Example.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/27. Credentials Discovered.mp4
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.4.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/17. Components of a Policy Document.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/13.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/16.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/16. Changing the Target Group Weighting.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/44. Gap Analysis Overview.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/24. HCL Basics Null Resource and Local Provisioner.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/26.mp4
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.2 LOGIC ATTACKS/SEC542- SANS OnDemand_4_2.webm
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/003-720.webm
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/041-720.webm
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/5.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/3.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/43. Encourage Employees to Obey the Law.mp4
1.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/003-720.webm
1.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/003-720.webm
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/006-720.webm
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/38.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/11.mp4
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/26.mp4
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/033-720.webm
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/026-720.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/26.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/42.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/11.mp4
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.28.mp4
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/027-720.webm
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_4.webm
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_16_2.webm
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/10. Azure DevOps Deployment Overview.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/8.webm
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.2.mp4
1.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/4. Alternative Browser Artifacts.mp4
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/10. File Carving/3.mp4
1.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/045-720_Analyzing_Multi-Technology_Malware.webm
1.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/31.webm
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/23. Situational Leaders Learn Critical Competencies.mp4
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/016-720.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/7.mp4
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/010-720.webm
1.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/16.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/8.mp4
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/023-720.webm
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/019-720.webm
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/2. Network Propagation/2.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/4.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/7.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/13.mp4
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/13.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/21.webm
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/014-720.webm
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_11.webm
1.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/019-720.webm
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/2. Change Patch and Vulnerability Management/7.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/18.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/6.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/21.webm
1.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.7 TRANSITIONING PYTHON2 TO PYTHON3/14.webm
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/7. DevOps Audit Defense Toolkit Infrastructure as Code (1).mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/7. DevOps Audit Defense Toolkit Infrastructure as Code (2).mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/7. DevOps Audit Defense Toolkit Infrastructure as Code.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/11.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/20.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/44.mp4
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/005-720.webm
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/016-720.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/12.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/23.webm
1.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/22. BetterCap Graceful Exit.mp4
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/10.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/2. Management Curriculum.mp4
1.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/1. Introduction to Smartphone Overview Fundamentals of Analysis SQLite/4. SANS DFIR.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/25. Related Documents 1.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/5.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/2. SMART Approach.mp4
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/26.mp4
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/011-720.webm
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/3.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/38.webm
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/019-720.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/15.mp4
1.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.4 LANGUAGE BASICS/30.webm
1.5 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/016-720_Malware_Memory_Forensics.webm
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/21.mp4
1.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/23. Frida Internals.mp4
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/026-720.webm
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/2.mp4
1.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/12. Snapchat Example 1.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/46.webm
1.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/24. Transaction Replay.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/26.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/28. The CD Pipeline Summary.mp4
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/15.mp4
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/5.mp4
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/27.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/3.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/30.webm
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/26.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/32. Course Roadmap 3.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/18. Purpose Fragments Examples.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/33. Managing and Leading Change.mp4
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/035-720.webm
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/31. Attack Summary 2.mp4
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/013-720.webm
1.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/15. Adding the Timestamp String to the Query.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/19.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/22. Container Security Commercial Docker Scanners.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/44. Strategic Planning for Security.mp4
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/3.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/4.mp4
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/41.mp4
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/038-720.webm
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/1. Compliance as Code.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/47.mp4
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/034-720.webm
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/19. Puppet Package File Service PatternExample.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/21.mp4
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/8.mp4
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/9.mp4
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.20.mp4
1.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/25. Encouraging Lost Device Reporting.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/36. Container Security NIST Life Cycle Considerations.mp4
1.5 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.5 HTTP NETWORK COMMUNICATIONS/08.webm
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/6.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/15.mp4
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/017-720.webm
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/8.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/21.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/36. Course Roadmap 5.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/6. ServerSide Encryption 2.mp4
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/010-720.webm
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/12. Analysis and Response/3.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/13.webm
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/13.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/23.webm
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/31.webm
1.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/22. Android Encryption.mp4
1.5 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/26.mp4
1.5 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/7.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/9. Putting It All Together/2.mp4
1.5 MB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/008-720.webm
1.5 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/021-720.webm
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.18.mp4
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/12.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/23. Writing Clean Puppet Code Modules and Patterns 2.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/3.mp4
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/2.mp4
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.12 SUMMARY/SEC542- SANS OnDemand_2.webm
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.81.mp4
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/3.mp4
1.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/20. Mobile Banking and InApp Purchases.mp4
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/8.webm
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/15. Lambda Programming Model.mp4
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/2.mp4
1.5 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/40. Identify Problem or Risk.mp4
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.4.mp4
1.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/35.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/16.mp4
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/15.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/2.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/24.mp4
1.5 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/15.mp4
1.5 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/5. What Are ThirdParty Apps.mp4
1.5 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/12. Microservice Security API Gateway.mp4
1.5 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/18.mp4
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand_4.webm
1.5 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/28.webm
1.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.6.mp4
1.5 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/020-720.webm
1.5 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/34. Frida Modifying Implementation.mp4
1.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_7.webm
1.5 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/20.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/11.webm
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/30.mp4
1.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/002-720.webm
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/031-720.webm
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/43. Weaknesses.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/10. Objection Dumping Memory.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/007-720.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/14.mp4
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/19.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/2. Douglas McGregor on Teams.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/38. Closing the Window of Exposure.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/25. Puppet Using Puppet with AWS.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/006-720.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/25.webm
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/017-720.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/27.webm
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/19.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/20.mp4
1.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/3. iOS File System Structures/8. LogicalBackup Data Obtained.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/30. CloudFormation Parameters.mp4
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.9 John the Ripper/SEC560 - 4.9.8.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/028-720.webm
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/1/6.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/39. DevOps Introduction Summary.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/002-720.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/003-720.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/22.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/8. Android IPC Permissions 1.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/41.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/11. Bypass USB Restricted Mode.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/32. Application Load Balancer.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/023-720.webm
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/26. Step 1 Identify Key Process Steps.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/34.webm
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/008-720.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/27.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/37.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/11.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/16. KMS Overview 2.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/8. iOS Boot.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/009-720.webm
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/44.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/006-720.webm
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.36.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/25.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/53.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/13.webm
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/6. Handling Secrets in Configuration Management Tools.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/38.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/034-720.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/12.webm
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/9. Ettercap SSL MITM.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/39.webm
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/16.mp4
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.2.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/030-720.webm
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/19. PROTECTION AGAINST MALICIOUS CA CERTS.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/18.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/14. Stakeholder Management Strategy.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/20. iOS Keychain Accessibility Attribute.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/31.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/13.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/19.webm
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.6.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/39.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/22. Lab 11 Solution Fitbit Case Debrief.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/2. SSLTLS Attacks.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/97.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/26. Frida CLI Startup Options.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/5. Microservice Architecture.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/009-720.webm
1.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/18.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/022-720.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/22.mp4
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.5.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/035-720.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/004-720.webm
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/30.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/30.mp4
1.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/13. WAL and SHM Aid the Investigation.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/002-720.webm
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_14.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/034-720.webm
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/9.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/018-720.webm
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/019-720.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/011-720.webm
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/5.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/005-720.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/013-720.webm
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_8.webm
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/25. Unit Testing for Security Get Off of the Happy Path.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/022-720.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/027-720.webm
1.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/08.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/009-720.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/21.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/005-720.webm
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/21.mp4
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_23.webm
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/28. Can PhoneGap Be Used Securely.mp4
1.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/001-720.webm
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/34. FileSystem Use.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/11.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/12. Azure Key Vault 1.mp4
1.4 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/10.webm
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_4.webm
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/2. Course Roadmap 1.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/007-720.webm
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/11. Continuous Delivery vs Continuous Deployment.mp4
1.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/4. Messaging App Artifacts.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/1. Course Roadmap.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/1. Cloud Security as a Service.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/27.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/006-720.webm
1.4 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/029-720.webm
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/23. Android Updates.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/008-720.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/41.webm
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/7. Technical Measures CIS Controls.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/14.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/002-720.webm
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/35. Making Frequent Change Safe.mp4
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_12.webm
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/016-720.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/40.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/3.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/11. Nikola Tesla 1856 1943.mp4
1.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/11. Narrow Down the Data Simple SQLite Query.mp4
1.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/7.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/17. Collateral Damage.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/018-720.webm
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/92.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/11.webm
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/014-720.webm
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/3. Android Component Exposure.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/10. Clayton Alderfer ERG.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/018-720.webm
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_3_2.webm
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/023-720.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/6. Internet of Things and SCADA/2.mp4
1.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/11.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/4. How To Define Current State.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/11.mp4
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_4.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/28.webm
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/4.mp4
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/19.mp4
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/21.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/2.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/53.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/45.webm
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/6.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/14.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/18.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/037-720.webm
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/17. CALMS Automation.mp4
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_6_2.webm
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/10.mp4
1.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/004-720.webm
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/15. Normal Permissions.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/18. Matching Your Learning Style.mp4
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_2.webm
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/33. Frida Modifying Arguments 2.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/15. Hacking the Supply Chain 2.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/55. Before We Begin.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/39.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/8. Cloud Infrastructure Leaders.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/019-720.webm
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/5.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/36.mp4
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_8.webm
1.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/11. Evidentiary Locations.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/5.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/007-720.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/16.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/012-720.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/017-720.webm
1.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/6. What Are People Installing.mp4
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.2.mp4
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.34.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/35.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/004-720.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/7.mp4
1.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/8. iOS Backup Files Requires Manual Examination.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/1. Mobile Penetration Testing/7. Your Role in a Penetration Test.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/6.webm
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/5. Evolution of Security Leadership.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/46. Intel SWOT Analysis Opportunities.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/12. Policy Protects Information.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/034-720.webm
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.1.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/6.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/011-720.webm
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand_2.webm
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/55.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/32.webm
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/14. AWS Lambda.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/4.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/13.mp4
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/26.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/23.webm
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/021-720.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/026-720.webm
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/12.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/7.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/65. Business Strategy.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/36. Why We Need to Do PEST Analysis.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/36.mp4
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/18.mp4
1.4 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/19. Payment Applications.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/016-720.webm
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_7_2.webm
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_9.webm
1.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/12. Analysis and Response/7.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/008-720.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/23.webm
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/048-720.webm
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/10. Foncy Permission Requirements.mp4
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_2.webm
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/52.mp4
1.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/3.mp4
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/16.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/9.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/13.mp4
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/022-720.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/011-720.webm
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.6.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/016-720.webm
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_8.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/4.webm
1.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/7. Roles and Responsibilities/4.mp4
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/23.mp4
1.4 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/4. Active Directory Permissions and Delegation of Authority for Damage Containment/1.mp4
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/36. In Summary 1.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/012-720.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/29.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/010-720.webm
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_4.webm
1.4 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/7.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/046-720.webm
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/10.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/031-720.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/012-720.webm
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/45.mp4
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/6.webm
1.4 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/30.webm
1.4 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/14. Delivery/3.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/39.mp4
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/8.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/4/2.mp4
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_8.webm
1.4 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/005-720.webm
1.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/10. Achievable 1.mp4
1.4 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/24. Pegasus AttackNSO.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/13.mp4
1.4 MB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/004-720.webm
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/7.mp4
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/25. Lab Prerequisite Reviewing Function Code.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/15.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/26.mp4
1.4 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/88.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/13.mp4
1.4 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/22.mp4
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.21.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/013-720.webm
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/2. Command Injection Review.mp4
1.4 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/9.mp4
1.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_3.webm
1.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.7.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/011-720.webm
1.4 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/35. Configuring the API Gateway Authorization Type.mp4
1.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/023-720.webm
1.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/065-720.webm
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/013-720.webm
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_12.webm
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/007-720.webm
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/21. iOS Visual Voicemail.mp4
1.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/010-720.webm
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/47.mp4
1.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/8.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/38.mp4
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.5 ANALYZING SPIDERING RESULTS/SEC542- SANS OnDemand_4.webm
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/41.mp4
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.12.mp4
1.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/032-720.webm
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/7. Secret Keepers.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/25. HCL Basic Outputs.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/27. Jenkins Credential Manager.mp4
1.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/8. AnyTrans A Solution to Unlock the iOS Backup 1.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/11.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/37. API Gateway Client Certificate Authentication.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/9.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/49.webm
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/43.mp4
1.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/007-720.webm
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/5.mp4
1.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/007-720.webm
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/25.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/8.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/25.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/14. Purpose of a Mission Statement.mp4
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.37.mp4
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/011-720.webm
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/9. File Metadata/4.mp4
1.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/12.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/21. Situational Leadership Model 1.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/16.mp4
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/016-720.webm
1.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/015-720.webm
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/003-720.webm
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/012-720.webm
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/18.webm
1.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/15. Hunting Android Malware.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/3.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/43. Example Postman Output.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/33. Duty to Monitor 1.mp4
1.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/12.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/14.webm
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/24.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/46. SAST Technology Landscape Configuration Management.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/34.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/75. Gauntlt Attack Adapters.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/6. App Binary Tests.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/43. Sustaining Versus Disruptive Innovation.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/21.mp4
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_13.webm
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/012-720.webm
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/12.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/15.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/15. Application Load Balancer Access Logs.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/37. Marketing and Executive Communications.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/14.mp4
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_9.webm
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/31.webm
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_5.webm
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/44.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/14.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/13.webm
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/25. Subnets.mp4
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.11 SUMMARY/SEC542- SANS OnDemand_2.webm
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_3.webm
1.3 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.11/012-720.webm
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand_3_3.webm
1.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/26. Hunting for Malware.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/7.mp4
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.4.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/11.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/8.mp4
1.3 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/47.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/20.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/17.webm
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/22. Hunt the Bug S3 CORS Configuration.mp4
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/014-720.webm
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/22.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/12.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/4.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/1. Course Roadmap 1.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/23. Advanced Obfuscators.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/16.mp4
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/006-720.webm
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/48.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/3. The Three Es of Learning.mp4
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/020-720.webm
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/011-720.webm
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/012-720.webm
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/007-720.webm
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/10.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/16.webm
1.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/12.webm
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.7.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/19.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/41. Time Wasters.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/15.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/15.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/11.mp4
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/002-720.webm
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/005-720.webm
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/9. Android ART Evolution.mp4
1.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/17. Placing the User at the Scene of the Crime.mp4
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.6.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/7. Rogerss Categories of Feedback.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/47.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/18. iPremier Gaps.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/12. GrayKey Cellebrite Locked Device Bypass.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/22. AWS Auditing Roadmap.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/21.mp4
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.6.mp4
1.3 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/005-720.webm
1.3 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/024-720.webm
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/67.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/2. Rules and Regulations/5.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/20.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/16.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/25. iOS Backup Resources.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/28.webm
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.13.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/15.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/17. KMS Infrastructure.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/19.webm
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.6 Post-Exploitation Activities/SEC560 - 3.6.2.mp4
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/035-720.webm
1.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/2.mp4
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/008-720.webm
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/5.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/9. Exception Requests.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/37.webm
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/32. Frida Modifying Arguments 1.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/25. EndUser Training.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/13. Overview 1.mp4
1.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/17. Placing the User At the Scene of the Crime 2.mp4
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_2_2.webm
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/4.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/20.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/11. Dale Carnegie Early Pioneer in Leadership Competencies.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/24.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/24. Docker Trusted Registry.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/22.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/17. Terraform Providers.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/36.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/10. Azure CLI Common Commands.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/39. Application Signature Verification.mp4
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/011-720.webm
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/021-720.webm
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/24. Prohibit Unlocking Sideloading.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/13.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/4. iOS Data Protection Classes.mp4
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_8.webm
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/061-720.webm
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/29.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/27.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/40.mp4
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.3 - Web Framework Defenses/005-720.webm
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.36.mp4
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/004-720.webm
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/16.webm
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/18.mp4
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/009-720.webm
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/1/3.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/1. Mobile Penetration Testing/6. How Can We Test.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/16. Identifying Xamarin Apps.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/8.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/9. Putting It All Together/3.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/15.webm
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/14.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/25. In Summary.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/5. Old Mobile Device Certificate Warnings .mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/13. Git Concepts.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/37.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/34.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/13. BHAG.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/60. Security Maturity.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/22.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/17. Language Exclamations to Sell.mp4
1.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/2.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/9.webm
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/8. Security in CodePipeline SAST with CI Integration.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/21.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/40. Lab Prerequisite Testing the API Gateway Endpoint.mp4
1.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/068-720.webm
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/22. Morgue Tool for Analyzing an Incident.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/13.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/23. Exercise Setup.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/28.mp4
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/16.mp4
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.7 INFORMATION LEAKAGE/SEC542- SANS OnDemand_3.webm
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/005-720.webm
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/29.webm
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/17.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/6.mp4
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.10 BURP INTRUDER/SEC542- SANS OnDemand_6_2.webm
1.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/1.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/2. How to Deliver the Program.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/68. Balanced Scorecard Dashboard.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/13.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/12.webm
1.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/5. Review All Tables for Relevant Items.mp4
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/17. Ettercap Graceful Exit.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/1. Background/8. Tips for Reading Case Studies.mp4
1.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.31.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/18. Text Transformations.mp4
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/092-720.webm
1.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/008-720.webm
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/10.mp4
1.3 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/1.mp4
1.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/011-720.webm
1.3 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/019-720.webm
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/39.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/15. Continuous Delivery Platforms.mp4
1.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/30. Mobile Malware Reverse Engineering and Analysis Android.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/16.mp4
1.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.2 PROCESSING DATA WITH STRUCT/17.webm
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/27. Frida CLI Injecting into Telegram.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/73.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/11.mp4
1.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.10 INTERCEPTION PROXIES/SEC542- SANS OnDemand_3_2.webm
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/7/4.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/9.mp4
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/038-720.webm
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/17.webm
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/2. Change Patch and Vulnerability Management/3.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/10.mp4
1.3 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/005-720.webm
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/14. Binary cookies.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/5. Edge Overview/3.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/11.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/22. The Power of Teamwork.mp4
1.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/13. Reporting/3.mp4
1.3 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/3. Motivation and Introduction/3.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/73. In Summary 2.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/29.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/15. Using Signed Cookies.mp4
1.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/96.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/25.webm
1.3 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/1. Course Roadmap.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/40.mp4
1.3 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.6 PACKET REASSEMBLY/16.webm
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/008-720.webm
1.3 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/16.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/12.webm
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/6.mp4
1.3 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/21.mp4
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/032_526/003-720.webm
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/52. Application Security Vulnerability Management Code Dx.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/24. CALMS Measurement at Etsy.mp4
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/47. Example 3 Animals in Office.mp4
1.3 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/27.webm
1.3 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/019-720.webm
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/21. Departmental Mission Statements.mp4
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/027-720.webm
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/2.mp4
1.3 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/022-720.webm
1.3 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/43. Risk Analysis.mp4
1.3 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/8.mp4
1.3 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/25. Viewing Deployment Progress.mp4
1.3 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/1. Smartphone Overview Fundamentals of Analysis SQLite.mp4
1.3 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/003-720.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/4. Are RATs a Big Problem.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/25.mp4
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/6. Planning/4.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/036-720.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/36. Hunt the Bug Leaky Buckets.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/12.mp4
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/22.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/11. Need To Fit In and Behavior.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/005-720.webm
1.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/015-720.webm
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_12.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/16.webm
1.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/3. Server Hardening Automation/7.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/44. Consider All Use Cases.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/049-720.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/17.webm
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.12 HEART BLEED/SEC542- SANS OnDemand_2_2.webm
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/12.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/13. How to Make People Like You.mp4
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_8.webm
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/6. Planning/2.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/61. School Policy Example.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/16. Monitoring Your CD Pipelines.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/22.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/1.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/026-720.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/58. Threat Actors and Motivations.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/027-720.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/007-720.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/26.webm
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_8.webm
1.2 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/61.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.8.mp4
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/41.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/11.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/31.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/33.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/8.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/6.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/076-720.webm
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/25.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/67.mp4
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/24.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/2. The Process of Communication.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/5. Metrics Data Formats.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.13.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/49.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/003-720.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/8. Cain Scanning.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/6.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/33.mp4
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/28.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/3. Scenario and Start/6.mp4
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_10.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/3. Reverse Engineering Android.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/8. AWS EC2 Limits.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/017-720.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/004-720.webm
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_9.webm
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/1. ThirdParty Application Analysis 1.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/9. Positive Example.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/12. Version ControlSource Code Management.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/15.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/36.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/19. Xposed.mp4
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/4. Android Evidentiary Locations/14. Location Settings on Android Devices.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/10.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/37. Service Roles to Limit Access.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/008-720.webm
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/039-720.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/4. Securing Data at Rest.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/8. AWS Security Monitoring Logging.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/019-720.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/10.webm
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/20. iOS Backup File Forensic Summary.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.26.mp4
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/3. Popular Browsers.mp4
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.1 WHY THE WEB/SEC542- SANS OnDemand_2.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/30. Inverted Policy Pyramid.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/10. Handling Exception Requests.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/017-720.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/9. Microservices Security Challenges 1.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/11. MyersBriggs Type Indicator MBTI Basic Preferences.mp4
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_3.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/032-720.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/31. Static Analysis in CD Developer SelfService.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/003-720.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/18.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/15.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/17. CIS Azure Foundation Benchmarks.mp4
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/12. Analysis and Response/5.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/030-720.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/6.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/5. Historical Analysis.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/14.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/037-720.webm
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/3. Scenario and Start/3.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/3.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/77. Automating Security Testing in CD OWASP Glue.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/15.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/001-720.webm
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/031-720.webm
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/11. Reconnaissance/2.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/005-720.webm
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/40.mp4
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/19. Keychain Use keychaindumper.mp4
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_14_2.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/19.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/12.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/91.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/4.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/008-720.webm
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/2.mp4
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/6. Mobile Malware Delivery Methods.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/83. Crown Jewels Example Hierarchy.mp4
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/8. Where to go from here/6. More Practice.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/28.mp4
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/13. Lab Interface.mp4
1.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/009-720.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/008-720.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/89. Secure Continuous Delivery Summary.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/12.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/82. Penetration Testing in DevOps.mp4
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/4.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/36. CloudFormation Resource Security Group.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/25.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/8. Less Measurable.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/6.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/82.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/030-720.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/28.webm
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.8.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/9.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/65. OneSentence Position Examples.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/30. TestDriven Security.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/069-720.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/23. Docker Content Trust.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.9.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/010-720.webm
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/35.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/31. CloudFormation Mappings.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/3.webm
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.107.mp4
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/12. Social Engineering/1.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.2.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/12.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/008-720.webm
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/18.mp4
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/8.mp4
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/10. Androidx86.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/7.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/51. Albert Einstein on Simplicity.mp4
1.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/018-720_Analyzing_Multi-Technology_Malware.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/11.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/35. Key Storage Android Key Store.mp4
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/3. Evidence of iOS Wiping 1.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/014-720.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/22. Mobile Malware Defense.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/034-720.webm
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.44.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/8. Configuration Management SaltSaltStack.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/010-720.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/006-720.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/55. Security Controls.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/20.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/58. Mobile Device Risks.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/5. Summary/6. Inject Security Into the CICD Pipeline.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/013-720.webm
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_6.webm
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/14. Deleted Application Traces.mp4
1.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/024-720.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/19.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/102-720.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/10.mp4
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/15.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/21.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/7. AWS Account Activation.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/18. Creating an Encrypted RDS Instance 3.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/6. Other Common Terms.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/5. Summary/4. Security Changes with DevOps and Cloud Changing Culture.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/016-720.webm
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/013-720.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/22.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/18.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/016-720.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/014-720.webm
1.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/9.mp4
1.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/011-720.webm
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/6.mp4
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/31.mp4
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/8. Impact on Mobile Forensics.mp4
1.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/010-720.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/030-720.webm
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_6_2.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/29. Data Exfiltration.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/36.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.21.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/21.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/015-720.webm
1.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.9/SANS OnDemand_07.webm
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/22.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/010-720.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/12. iPremier PEST Analysis.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.40.mp4
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/25.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/18.webm
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/10. Target Manipulation Collection and Exfiltration/3.mp4
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/7. Burp Suite Site Map.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/39.webm
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/13.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/20.webm
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/12.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/6.mp4
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/12.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/1. Course Roadmap 1.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/21.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/004-720.webm
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/026-720.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/6. Reasonable Person Rule.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/47.webm
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/013-720.webm
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/009-720.webm
1.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.4/033-720.webm
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/12.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/11. Azure DevOps.mp4
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/47.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.7.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/60.webm
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/18.mp4
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.7 INFORMATION LEAKAGE/SEC542- SANS OnDemand_4.webm
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/3.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/018-720.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/1. Course Roadmap.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/008-720.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/10.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/41.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/17. Creating an Encrypted RDS Instance 2.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.9.mp4
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/9.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/11.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/23.mp4
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/10. Point Value of Analysis Tasks.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/004-720.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/17. Puppet Basics The Puppet DSL.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/2. What Is Serverless.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/009-720.webm
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/16.mp4
1.2 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_06.webm
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/020-720.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/22.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/9.webm
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/39.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/073-720.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/15. Azure Kubernetes Service Terraform 1.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/18.mp4
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/23. KnowledgeC.mp4
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/77. In Summary 3.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/26.webm
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/19. BetterCap Target Designation.mp4
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_8.webm
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/8.mp4
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/32. Certificate Details.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/009-720.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/32.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/28.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/3.mp4
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/28. Dalvik Virtual Machines and the dex file.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/17. AWS WAF Matching Conditions.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/007-720.webm
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/17. Lab 21 AWS and Jenkins Configuration.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/7.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/011-720.webm
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/17.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/16. Locked Device Apple Siri Access.mp4
1.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_16.webm
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/10.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/019-720.webm
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/008-720.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/25.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/23.webm
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/9.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/29.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/020-720.webm
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/36.mp4
1.2 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/14.mp4
1.2 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/027-720.webm
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/11. Carving for Data.mp4
1.2 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/7. CloudWatch.mp4
1.2 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/12.webm
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/9. Android IPC Permissions 2.mp4
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/36. Summary of Findings NowSecure.mp4
1.2 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/35. Automated apk Analysis Using Online Sandboxes.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/023-720.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/38. What Is Marketing.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.3.mp4
1.2 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/033-720.webm
1.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/28. Tips for Using the Cybersecurity Framework.mp4
1.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/62.mp4
1.2 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.1 Why Exploitation/SEC560 - 3.1.1.mp4
1.2 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/26. Module Summary.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/023-720.webm
1.2 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/6.mp4
1.2 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/9.mp4
1.2 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/006-720.webm
1.2 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/14.mp4
1.2 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/9.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/18.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/24. Manage Client Relationships.mp4
1.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.5/020-720.webm
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/17. Container Security Image Poisoning.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_14.webm
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/12.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/014-720.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/26. Customer Complaint Resolution.mp4
1.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/011-720.webm
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/11.mp4
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/50.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/21.webm
1.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/7. Alternative App Stores.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/19.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/6. iOS Application Interaction/4. Universal links.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_7_2.webm
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.2.mp4
1.1 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/024-720.webm
1.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/19. Wickr Example.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/42. Map Security to Business Goals.mp4
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.6.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/30.webm
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/015-720.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/28. Lab 21 Creating a Mission Statement 2.mp4
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/045-720.webm
1.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/12.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/8. Ettercap Certificate Impersonation.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/5.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/55.webm
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/19.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/37. SecDevOps DevSecOps DevOpsSec Rugged DevOps.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/18.webm
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/13.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/2. Network Traffic Manipulation.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/2.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/5. Edge Overview/5.mp4
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/35.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/10. Swapping the Traffic Manager Weight.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/13.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/2.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/4.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/025-720.webm
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/013-720.webm
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/14.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/25. How Does the Client See Things.mp4
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/14.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_7.webm
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/010-720.webm
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/16.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/9.mp4
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/7. Roles and Responsibilities/7.mp4
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/1.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_7.webm
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/9. Cain APR.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/2.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/2. What Are Containers.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/51. Step 1 Document Current Capabilities.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/25.mp4
1.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/7. Locate the Databases of Interest Android.mp4
1.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/063-720.webm
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.11.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/31.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/2. Organizational Behavior.mp4
1.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/1. PowerShell Ransomware/4.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/004-720.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/18. Nonverbal Selling.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/021-720.webm
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/029-720.webm
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/6.webm
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/35.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/34.webm
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/7.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/8.mp4
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.17.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/11.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/35.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/21. More Tips for Great Presentations.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/25.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.2 DOCUMENT OBJECT MODEL/SEC542- SANS OnDemand_2.webm
1.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/009-720.webm
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/87. Lab 14 Automating Dynamic Analysis.mp4
1.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/12. How MDMs Impact Investigations.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/004-720.webm
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/040-720.webm
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/21.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/22.mp4
1.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/2. Locked Android Devices/1. Android Forensics Agenda.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/18.webm
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/14.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/17. Career Management Resilience.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_16.webm
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/18. Capital One Continuous Delivery Clean Room.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/63. What Type of Policy.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/2.mp4
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/10. Exercise Execution/2.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/22. Debug Detection.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/028-720.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/3.mp4
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/5.mp4
1.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/19. nsdb.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand_5.webm
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/9. Secret Keepers Commercial.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/12.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/23.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/8. Security in CD PreCommit Stage.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/35.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/40. Steve Jobs on Marketing.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/10. iOS 12 Jailbreak Chimera.mp4
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/13. Reporting/5.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/7.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/26. Framework Categories.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/049-720.webm
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/17.webm
1.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/1.mp4
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/51.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/23.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/33. Secret Keepers A Closer Look at HashiCorp Vault.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_10.webm
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.19.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/8.webm
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/20.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/9. Sample Question 2.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/14.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/21.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/4.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/27.webm
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.2 DOCUMENT OBJECT MODEL/SEC542- SANS OnDemand_6_2.webm
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/14.mp4
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/10.mp4
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/027-720.webm
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/13.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/006-720.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/5.mp4
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/7. Roles and Responsibilities/5.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_3_2.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/10.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_2.webm
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_7.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/16.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/21. WebAcl Example.mp4
1.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.1 NETWORK COMMUNICATION/15.webm
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/019-720.webm
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/19.mp4
1.1 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/55.mp4
1.1 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/1.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/2. SANS DevSecOps Curriculum.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/12.mp4
1.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/005-720.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/10.mp4
1.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/011-720.webm
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.8.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_8.webm
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_14.webm
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/21.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/12.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/009-720.webm
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_16.webm
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/9.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/6. Measuring Policy.mp4
1.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/21. Connectivity Traces You May Leave Behind.mp4
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.108.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_14.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/10.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/50.mp4
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.5.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/19.mp4
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/6. Planning/7.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/026-720.webm
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/50.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/004-720.webm
1.1 MB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.3 PYTHON'S IMAGE LIBRARY/09.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/9. If You Want To Change Behavior.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/014-720.webm
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/012-720.webm
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/4.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/024-720.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/38. Manage Relationships.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_3.webm
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/010-720.webm
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/012-720.webm
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/012-720.webm
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.30.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/21. Key Policies.mp4
1.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/010-720.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/21.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/10.mp4
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/1/3.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/12. Installing Unc0ver.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/2. Security in CD Operations.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/14. Working in DevOps CAMS and CALMS.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/37. Container Security Attacking Docker.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_14.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/9.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_24.webm
1.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/014-720.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/16.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/38.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/008-720.webm
1.1 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/008-720.webm
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/008-720.webm
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.4-Vunerable Web Apps-Mutillidae/SEC542- SANS OnDemand_2.1.webm
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/4.mp4
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/018-720.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/13.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/020-720.webm
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/64.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/64. Why Create a Business Case.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/008-720.webm
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/15.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/17. Security Measures Implemented by iPremier.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/3. Software Security Testing/3.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_8_2.webm
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/13.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/8.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/19.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/011-720.webm
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/18.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/15. Terraform Benefits.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/6.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/33. Container Security Docker Hardening Guidelines.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/026-720.webm
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/007-720.webm
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/2. INTERCEPTING SSLTLS Traffic.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/22.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/8.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/024-720.webm
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/6.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/13. osquery in Enterprise Environments.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/28. Frida What it Can Do.mp4
1.1 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/004-720.webm
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_7.webm
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/14. Terraform by HashiCorp.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/15.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_13_2.webm
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/41.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_6.webm
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.80.mp4
1.1 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/8. Rules of Engagement/8.mp4
1.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/27. Anatomy of Application Files Android.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/4.mp4
1.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_21.webm
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/21. Keeping the Team Moving Forward 2.mp4
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/015-720.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/17.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/16. Security Token Service STS.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/4.webm
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/6.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/19.webm
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/99.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/8. DevOps Audit Defense Toolkit Traceability.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/17. Android Passcode Attacks.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/11. OK But MainActivity Seems Suspicious .mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/6.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/34.webm
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/28.webm
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/19. Course Roadmap 2.mp4
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/84.mp4
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.7.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/32. Subnet Network Access Control Lists NACLs.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/38.webm
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/007-720.webm
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/17. Swift and Cydia Substrate.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/12.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/22.mp4
1.1 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/059-720.webm
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/8.mp4
1.1 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/23.mp4
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/26. Defense Techniques.mp4
1.1 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/9.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/28.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/11. Network as Code.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/8. Data Stream Carving/7.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/9. Who Should Take This Course.mp4
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/4. Securing Chef Environment.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/5. Active and Passive Listening.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/34.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/19.mp4
1.1 MB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/004-720.webm
1.1 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/3. Warning Code Ahead.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/34.webm
1.1 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/3. Common Chat Applications.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/2.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/27. Relationship Management In Three Steps.mp4
1.1 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/45.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/42.mp4
1.1 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/17.mp4
1.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.28.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/1. Background/7. Case Study Discussion.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/10. Jules Verne 1828 1905.mp4
1.1 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/33. Lab 21 Solution Highlight Keywords.mp4
1.1 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/30.webm
1.1 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/19. Container Security Image Scanning.mp4
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/17.webm
1.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/1. Dynamic Mobile Application Analysis and Manipulation/1. Dynamic Mobile Application Analysis and Manipulation.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_19.webm
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/19.mp4
1.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/29. BYOD Drivers.mp4
1.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.21.mp4
1.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/38. Object Obfuscation.mp4
1.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.1.mp4
1.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/67. Security Capability Dashboard.mp4
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/22.webm
1.0 MB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/45.mp4
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/23.webm
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/24.webm
1.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/020-720.webm
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/16.mp4
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/17.mp4
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/30. Private Subnets.mp4
1.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.3/SANS OnDemand_20.webm
1.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/006-720.webm
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/5. Preventing Secrets in Code.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/15.mp4
1.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/011-720.webm
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_7.webm
1.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/020-720.webm
1.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/79. Goals of This Section.mp4
1.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/005-720.webm
1.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/5.mp4
1.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/4/7.mp4
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/9. Azure Command Line Interface CLI Getting Started.mp4
1.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/039-720.webm
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/50. Lab Prerequisites.mp4
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/56.webm
1.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/5. Handling Locked iOS Devices/2. iOS Lock Codes.mp4
1.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.7.mp4
1.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/11. Application Privileges.mp4
1.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/39. Report the Results.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/15.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/1. Classify Information and Supporting Assets/8.mp4
1.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/19.mp4
1.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/015-720.webm
1.0 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/AUD 507 Tools Quickreference.pdf
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/18. STS API Gateway CloudFormation Role Example.mp4
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/22.webm
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/12. AWS WAF Overview.mp4
1.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/031-720.webm
1.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/031-720 (1).webm
1.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/23.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_4.webm
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/70. Scanning APIs in CICD Using OWASP ZAP.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/9.mp4
1.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/11. Trusting Burps Certificate.mp4
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/24.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_6_2.webm
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/2. The Dark Web/6.mp4
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/1.mp4
1.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/6. Why Metrics Are Important.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_10_2.webm
1.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/070-720.webm
1.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/5. Persistence/9.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_5.webm
1.0 MB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/009-720.webm
1.0 MB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/1.mp4
1.0 MB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/64.mp4
1.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/024-720.webm
1.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/3. Web Application Attacks.mp4
1.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/032_526/001-720.webm
1.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/007-720.webm
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/29.mp4
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/32.mp4
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/11.webm
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/10.webm
1.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/13. Changing the Column Names.mp4
1.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/034-720.webm
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.10 INTERCEPTION PROXIES/SEC542- SANS OnDemand_4_2.webm
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_9_2.webm
1.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/011-720.webm
1.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/1. iOS Forensics Overview/1. iOS Device Forensics.mp4
1.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/032-720.webm
1.0 MB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/006-720.webm
1.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/016-720.webm
1.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/49. Purpose of a Value Statement.mp4
1.0 MB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/019-720.webm
1.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/10. Exercise Execution/1.mp4
1.0 MB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/26.mp4
1.0 MB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/12.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/2.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_21.webm
1.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/010-720.webm
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/28.webm
1.0 MB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/27.mp4
1.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/14.mp4
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/5. ServerSide Encryption 1.mp4
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/12.webm
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/4.mp4
1.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/75.mp4
1.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/17. Android Device Admin Privilege.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_20.webm
1.0 MB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/036-720.webm
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_5_3.webm
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/7.mp4
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/19. Azure Global High Availability.mp4
1.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/010-720.webm
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/13.mp4
1.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.1 LISTS/17.webm
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/37.webm
1.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/015-720.webm
1.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/010-720.webm
1.0 MB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/020-720.webm
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/21. Jenkins Blue Ocean Visualizing and Modeling Pipelines.mp4
1.0 MB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/007-720.webm
1.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/27. Organizational Assumptions Beliefs and Values ABVs.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.5 ANALYZING SPIDERING RESULTS/SEC542- SANS OnDemand_3.webm
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/27. Security and Compliance with Puppet SIMP.mp4
1.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/23.mp4
1.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/4. Frameworks and Methodologies/12.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/6. Internet of Things and SCADA/5.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_15.webm
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/19.mp4
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/21.webm
1.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/13.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/6. Internet of Things and SCADA/4.mp4
1.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/36.mp4
1.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/58.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/2.mp4
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/16.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/15.mp4
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/11.mp4
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/2. Rules and Regulations/6.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/42.mp4
1.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_4.webm
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/21.mp4
1.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/7. Fight Versus Flight.mp4
1.0 MB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/081-720.webm
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/4.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/25.mp4
1.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/32.mp4
1.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/33. Network Analysis.mp4
1.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/2.mp4
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/34. API Gateway Authentication and Authorization.mp4
1.0 MB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/34. Container Security CIS Benchmark for Docker.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/16.mp4
1.0 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/22. Attack Summary 1.mp4
1.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/15.mp4
1.0 MB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/12.mp4
1.0 MB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/18. Payment Apps and Mobile Wallets.mp4
1.0 MB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/5.mp4
1.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/001-720.webm
1.0 MB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.2 FILE INPUT OUTPUT/18.webm
1.0 MB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/36.webm
1.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/2. Automating App Analysis.mp4
1.0 MB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/7.mp4
1.0 MB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/21. Frida for Rooted Devices fridaserver.mp4
999.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/25. Office365 Next Steps.mp4
999.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/24. Strategic Planning Process.mp4
999.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_10_2.webm
998.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/19.mp4
998.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.10 BURP INTRUDER/SEC542- SANS OnDemand_4_2.webm
998.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/49.mp4
997.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/35.mp4
997.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/9. Effective Communication Tips.mp4
997.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/11.mp4
997.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.14.mp4
997.2 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/72.mp4
996.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/36. It All Comes Down to a Simple Question.mp4
996.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/89.mp4
996.3 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/29.mp4
996.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/24.webm
996.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.24.mp4
995.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.70.mp4
995.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/18.mp4
995.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/11. iOS Certificate Pinning.mp4
995.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/15.webm
994.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/12.mp4
993.9 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/097-720.webm
993.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/028-720.webm
993.4 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/4.mp4
992.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/17. In Summary.mp4
991.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/1. Course Roadmap 1.mp4
991.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/51.mp4
991.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/21. SIPOC Stakeholder Identification Tool.mp4
989.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/53. CloudFormation Nag Security Scanner.mp4
989.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.29.mp4
988.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/17.mp4
988.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/58. Core Values Worksheet 2.mp4
987.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/4.mp4
987.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/4.mp4
987.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_11.webm
986.9 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/1. Windows Management Instrumentation/25.mp4
986.8 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/021-720.webm
986.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/19.webm
986.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.18.mp4
986.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/65.mp4
986.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/28. DevOps and Compliance Summary.mp4
986.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/017-720.webm
985.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/001-720.webm
985.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/5.mp4
984.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/027-720.webm
984.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_2.1.webm
984.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_2.webm
984.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/12.mp4
984.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/11.webm
983.6 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/13. Reporting/4.mp4
982.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/11.webm
982.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/2/9.mp4
981.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/004-720.webm
980.1 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/3.mp4
980.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/3.mp4
979.3 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/21.mp4
979.2 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/11. Exercise Closure/1.mp4
979.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/14.mp4
978.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/14.mp4
978.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/25.mp4
977.6 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/9. File Metadata/2.mp4
976.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/11.mp4
976.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/7. Launching Cycript.mp4
974.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/26.webm
973.3 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/23.mp4
973.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/30. ECS Clusters.mp4
973.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/12. Are You a Bot.mp4
973.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/018-720.webm
972.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/14.mp4
972.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_20.webm
971.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/25.webm
971.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/23.mp4
970.8 kB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/09.webm
970.8 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/13.mp4
970.5 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/025-720.webm
969.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/26.mp4
969.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/37.webm
969.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/30.mp4
969.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/38. Configuring API Deployment Logging Permissions.mp4
969.4 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/16.mp4
969.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/73. Security Attacks Introduction to Gauntlt.mp4
969.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/014-720.webm
968.6 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/10.mp4
967.6 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/062-720.webm
967.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/23.mp4
967.4 kB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/12.webm
967.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_14.webm
967.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/79. Limits to Automated Security Tests.mp4
966.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_17_2.webm
966.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/3.webm
966.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/042-720.webm
966.2 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/12. Analysis and Response/6.mp4
966.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/80. Tangible Assets.mp4
965.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/29.mp4
965.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_11_2.webm
965.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/8.mp4
965.5 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/031-720.webm
965.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_9.webm
965.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/23. Lab Prerequisite SSLTLS Warning.mp4
964.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/48.mp4
964.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/17. Four Major Factors of Leadership.mp4
963.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/005-720.webm
963.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/7.mp4
963.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/2. Evidence Hiding.mp4
963.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.1 - Introduction to Web Frameworks/003-720.webm
962.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/009-720.webm
962.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/035-720.webm
962.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/24.mp4
961.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/003-720.webm
960.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/19. Swapping the ECS Service.mp4
960.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/20. Impact in Ukraine.mp4
960.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/4. Azure CDN.mp4
959.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/21. Web Identity Federation.mp4
959.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/18.mp4
957.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/3. Federated and Cloud Identity/7.mp4
957.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/29. Microservice Security Secure Coding.mp4
956.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/24.webm
955.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/60. Inappropriate Mobile Device Use Sexting.mp4
955.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/15.mp4
954.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.19.mp4
954.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/005-720.webm
954.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/10.mp4
954.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/3/3.mp4
953.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/39.webm
953.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/15.mp4
951.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_10.webm
951.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.15.mp4
951.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/25. Cloud Custodian CloudTrail Log.mp4
951.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/042-720.webm
950.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/8.webm
950.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_8.webm
950.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/78.mp4
950.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/24. Angie Morgan on Conflict Resolution.mp4
949.7 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/11.mp4
949.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/11.mp4
949.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/4.mp4
948.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/002-720.webm
948.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/38. Carl Sandburg on Time Management.mp4
948.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/26.mp4
948.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_10.webm
948.1 kB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/06.webm
947.8 kB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/05.webm
947.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/13.mp4
947.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/10.mp4
947.1 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/16.mp4
947.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_6.webm
946.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/16.webm
946.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/43. Quality of Work Life QWL.mp4
946.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/22.mp4
946.4 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.9/002-720.webm
946.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/22.webm
945.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/30. App Logging.mp4
945.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/024-720.webm
945.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/8. Burp Suite Proxy Match and Replace.mp4
944.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/13. Vision Statement Keyword Examples.mp4
943.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_10.webm
943.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/22. SIPOC Matrix.mp4
943.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/18.mp4
943.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/19.webm
942.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/13.mp4
941.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/81.mp4
941.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.89.mp4
940.8 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/6.mp4
940.3 kB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/031-720.webm
940.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/33.mp4
940.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/9.mp4
940.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/5.mp4
939.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/41. IAM Policy Simulator.mp4
939.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/38. Political.mp4
939.8 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/045-720.webm
939.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/024-720.webm
939.6 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/10.mp4
939.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/8. Where to go from here/2. Where to Go from Here.mp4
939.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/008-720.webm
939.2 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/29.mp4
939.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/22.mp4
937.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/18.mp4
937.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/35.webm
937.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/8. McGregor Theory X.mp4
937.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/8.mp4
937.3 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/5. AXIOM Fundamentals/1. Smartphone Overview Fundamentals of Analysis SQLite Introduction Android Forensics Overview and Android Backups.mp4
936.8 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/050-720.webm
936.3 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/5. Persistence/7.mp4
935.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/016-720.webm
935.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_4.webm
935.2 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/9.mp4
934.8 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/6.mp4
934.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/26.webm
934.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/044-720.webm
933.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.2 TESTING SOFTWARE CONFIGURATION/SEC542- SANS OnDemand_6.webm
933.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.8.mp4
933.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/25.mp4
933.2 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/2. The Donald Blake Case/8.mp4
932.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/18. CloudWatch Events.mp4
932.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/003-720.webm
932.2 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/8.mp4
931.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/45. SAST Technology Landscape.mp4
930.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.2.mp4
930.5 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/18. Scanning for Malware with Cellebrite Physical Analyzer.mp4
930.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/22.mp4
930.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/006-720.webm
929.7 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/003-720.webm
929.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/16. Extending SAST in CodePipeline.mp4
929.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/4. Objection Startup Options.mp4
928.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_7.webm
928.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/7.mp4
927.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/7.webm
927.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/25.webm
926.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/28.webm
926.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/38. What Is SWOT Analysis.mp4
926.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/12.mp4
926.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_4_2.webm
925.5 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/014-720.webm
924.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/18.mp4
924.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/45.webm
924.1 kB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.6 FUNCTIONS/17.webm
924.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/007-720.webm
924.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/46.mp4
923.0 kB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/007-720.webm
922.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/12.mp4
922.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/009-720.webm
922.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/4. Drozer Agent.mp4
922.3 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/38.mp4
922.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_14.webm
922.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/17.mp4
921.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/4. Your Position.mp4
921.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/37.mp4
920.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/18. iOS Application Files.mp4
920.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_6.webm
920.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.5.mp4
919.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/5.mp4
919.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/17. Android Nougat Certificate Trust 2.mp4
919.6 kB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/12.webm
919.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/17. Azure Kubernetes Service Terraform 3.mp4
918.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/23.mp4
918.4 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/9. Action on Objectives/2.mp4
917.7 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/025-720.webm
917.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/019-720.webm
916.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/47. Threats.mp4
916.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/2.mp4
915.5 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/10. Target Manipulation Collection and Exfiltration/7.mp4
915.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/14.mp4
915.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/13.mp4
914.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/8.webm
914.7 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/5.mp4
914.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/28.webm
914.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/21. ThirdParty Security Monitoring.mp4
914.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/8. Where to go from here/4. GPWN Mailing List.mp4
914.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/15. Jonathan Swift on Vision.mp4
913.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/20.mp4
913.5 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/22.mp4
913.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/25.webm
912.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/48.webm
912.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/20.webm
912.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/20. AWS Monitoring Roadmap.mp4
912.1 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/6.mp4
911.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_12_2.webm
910.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/2.mp4
910.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/30.mp4
910.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_4_2.webm
909.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/2. Rules and Regulations/9.mp4
909.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/007-720.webm
909.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/15. Manifestplist.mp4
909.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/37.webm
908.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/10.mp4
908.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/26.webm
908.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.53.mp4
908.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/6.mp4
908.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/14. Testing Certificate Pinning.mp4
907.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/9.mp4
906.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/16. Lambda Security Model.mp4
906.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.5 ANALYZING SPIDERING RESULTS/SEC542- SANS OnDemand_2.webm
905.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_3_2.webm
905.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/22.mp4
905.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.35.mp4
904.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_2.webm
904.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/31. Docker Security cgroups.mp4
903.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_10.webm
903.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/20.mp4
903.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/011-720.webm
902.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_7_2.webm
902.3 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/41.mp4
902.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/3. Secure Messaging Applications.mp4
902.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/006-720.webm
901.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/3.mp4
901.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/21. Communicate to Reduce Resistance to Change.mp4
900.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.6 Web App Overview/SEC560 - 5.6.1.mp4
900.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/8.mp4
900.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/28.webm
900.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/9. Strategic Plan Dick Tracys Watch.mp4
899.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/16.webm
899.8 kB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/30.webm
899.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/18. Rapid Spread.mp4
899.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/18.mp4
899.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/005-720.webm
899.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/3. Federated and Cloud Identity/2.mp4
899.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_14.webm
899.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/30.mp4
898.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/3. iCloud Extractions/6. Accessing iCloud Backup Files 4.mp4
897.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/20.mp4
897.8 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/7.mp4
897.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.10.mp4
897.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/002-720.webm
896.5 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/012-720.webm
896.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/44. Static Analysis Finding the Right Tool.mp4
896.0 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/016-720.webm
895.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/32.mp4
895.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/21.mp4
895.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/25.mp4
894.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/031-720.webm
894.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/13.webm
894.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/008-720.webm
894.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_7.webm
893.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/22.mp4
893.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/10.mp4
893.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/43.mp4
893.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/20. Creating a WAF WebAcl CSRF.mp4
893.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_8.webm
893.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/18.webm
893.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/022-720.webm
893.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/40. Update Policies Regularly.mp4
892.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/13. XSS Rule Example.mp4
892.2 kB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/002-720.webm
892.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/036-720.webm
892.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/63. Security in CD Acceptance Stage.mp4
890.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/2. Rules and Regulations/8.mp4
890.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/29.webm
890.5 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/21.mp4
890.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/006-720.webm
890.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/036-720.webm
889.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.18.mp4
888.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/38. Course Roadmap 3.mp4
888.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_5.webm
887.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/040-720.webm
887.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/14. Other iOS Privileges.mp4
887.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/9. McGregor Theory Y.mp4
887.4 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.1/SANS OnDemand2.webm
887.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/014-720.webm
886.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.1 Scanning Goals, Types, and Tips/SEC560 - 2.1.4.mp4
886.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/21.mp4
886.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/9. Android Emulator View.mp4
886.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/3.mp4
885.3 kB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/006-720.webm
884.8 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/13.mp4
884.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.1.mp4
884.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_5.webm
884.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/010-720.webm
883.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/12.mp4
883.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/26.mp4
883.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/4.mp4
883.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/11.webm
883.3 kB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/009-720.webm
883.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/32.webm
882.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/28. Course Roadmap 2.mp4
881.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/35. Metrics in Summary.mp4
881.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/028-720_Code_Injection_API_Hooking.webm
881.4 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/1.mp4
881.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/011-720.webm
881.1 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/6. Planning/1.mp4
880.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/21.webm
880.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/26. Performance and Conflict Resolution.mp4
879.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/5. Resources.mp4
879.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/10.mp4
879.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/31. Permission Evaluation.mp4
879.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/29.webm
879.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/7.mp4
879.2 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/7. BLOBs Used to Store Plaintext Data.mp4
879.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/023-720.webm
879.1 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/13.mp4
877.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/012-720.webm
877.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/4.mp4
877.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/016-720.webm
877.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/17. Power of Praise.mp4
876.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.14.mp4
876.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/77.mp4
876.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/17. AWS GuardDuty Threat Detections.mp4
876.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/6. What Are the Major Periods of Change.mp4
876.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/36.mp4
875.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_3_2.webm
875.6 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/098-720.webm
875.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/16.mp4
875.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/3. Federated and Cloud Identity/5.mp4
875.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/051-720.webm
875.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/12.mp4
874.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/46. In Summary 2.mp4
874.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/16. Alerts Knowledge Screenshots.mp4
874.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/37.webm
874.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/26. CALMS Sharing at Google.mp4
873.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/1.mp4
873.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_10.webm
873.3 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/14. How the WAL Gets Populated Initial State.mp4
872.6 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/24.mp4
872.2 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/12.mp4
871.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/17.webm
871.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/7.mp4
870.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/006-720.webm
870.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/19.mp4
870.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/84.mp4
869.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.10 BURP INTRUDER/SEC542- SANS OnDemand_3_2.webm
869.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/004-720.webm
868.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/8. Where to go from here/5. Staying Current.mp4
868.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_11.webm
868.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/9. OWASP A10 Insufficient Logging Monitoring.mp4
868.5 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/63.mp4
868.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/003-720.webm
867.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/63.webm
867.4 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/023-720.webm
867.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_9_2.webm
866.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.39.mp4
865.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.10 BURP INTRUDER/SEC542- SANS OnDemand_2_2.webm
863.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/11.mp4
863.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/4.mp4
863.5 kB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/002-720.webm
863.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/18.mp4
863.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/18.mp4
862.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/35.webm
862.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/033-720.webm
861.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/10. Negative Voicing Never.mp4
861.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/023-720.webm
860.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/024-720.webm
859.4 kB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/001-720.webm
859.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/12. Docker Daemon Attack Surface.mp4
858.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/20.webm
857.4 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/5. Edge Overview/2.mp4
856.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/020-720.webm
855.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/7. IBM A Century of Innovation.mp4
855.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/015-720.webm
855.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/22. FanReact.mp4
854.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/22. CALMS Measurement.mp4
854.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/41. Policies and Risk Assessments.mp4
853.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/16. Azure Kubernetes Service Terraform 2.mp4
853.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/27. Secrets Management.mp4
852.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.6 Contingency Planning - BCP- DRP/28.webm
852.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/28. CloudFormation Templates.mp4
852.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_15.webm
848.5 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/49.mp4
848.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/21.mp4
847.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/48.mp4
847.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/041-720.webm
846.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/40.mp4
846.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/33.webm
846.1 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/001-720.webm
846.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/7. Analyzing Ouija App.mp4
845.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/53.webm
844.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/41.mp4
844.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/013-720.webm
844.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/19.mp4
843.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/23.mp4
843.3 kB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/013-720.webm
840.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/42. Marketing Its a SNAP.mp4
840.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/37.mp4
839.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/13.webm
839.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/3.mp4
839.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/3.mp4
839.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/12.webm
838.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/12.mp4
838.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/21. AV Evasion.mp4
838.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/13. Course Roadmap 2.mp4
837.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/21.mp4
837.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/51. Managing SSLTLS Certificates.mp4
836.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/012-720.webm
836.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/022-720.webm
835.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/002-720.webm
835.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/5. Objection Reconnaissance.mp4
834.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/20.webm
834.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/37. PEST Analysis.mp4
834.2 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/007-720.webm
833.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/6.mp4
832.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/25.webm
832.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/26.webm
832.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_9.webm
831.9 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/16.mp4
831.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/6. Objection Reconnaissance 2.mp4
831.6 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/2. The Donald Blake Case/7.mp4
831.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/021-720.webm
831.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/8.mp4
831.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/18.webm
830.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/13.webm
830.7 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/14. Notifications.mp4
830.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_7_2.webm
830.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/24.mp4
830.0 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/5. Threat Intelligence/1.mp4
829.9 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/8.mp4
828.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/18. Bolman and Deals Four Frame Model.mp4
828.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.5-Command Injection/SEC542- SANS OnDemand_3.webm
828.1 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/011-720.webm
828.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/012-720.webm
828.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/6. Google Cloud Extractions and Analysis/4. Warning The User Will Be Alerted.mp4
827.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/3/11.mp4
827.6 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/1. ThirdParty Application Analysis.mp4
824.9 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/039-720.webm
824.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/8.mp4
823.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/15.webm
823.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.19.mp4
823.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/83.mp4
823.5 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/4. Privilege Escalation/1.mp4
823.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/55.mp4
822.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/24. Jenkins Pipeline Stages 1.mp4
822.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/037-720.webm
822.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/20.mp4
820.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/35. Performance Reviews Feedback Versus Criticism.mp4
819.8 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/044-720.webm
819.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/020-720.webm
818.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/74. Gauntlt BDD and Gherkin DSL.mp4
817.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_6.webm
816.5 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/29.mp4
816.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/6. Infrastructure as Code TestDriven Infrastructure TDI.mp4
815.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/20.webm
814.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/6.mp4
814.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/66.mp4
814.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/15.webm
814.0 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.6/001-720.webm
813.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/25. Cloud Computing Policy Debrief.mp4
812.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/38.webm
810.8 kB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/029-720.webm
809.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/9.webm
809.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/038-720.webm
809.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/32.webm
808.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/7.mp4
808.1 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/11.mp4
808.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/4/12.mp4
807.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/10.mp4
807.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/1. Course Roadmap.mp4
806.9 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.10/019-720.webm
806.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/58.mp4
805.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/26.webm
805.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/12.webm
804.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/61.webm
804.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/035-720.webm
804.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.83.mp4
804.0 kB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/021-720.webm
803.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/24.mp4
803.7 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/050-720.webm
803.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/5. Understanding Threat Actors.mp4
802.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/1. Course Roadmap 1.mp4
802.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/18. Career Management Professionalism.mp4
802.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/11.mp4
802.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.6.mp4
802.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/19. Device Passcode Recommendations.mp4
802.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/1. Dynamic Mobile Application Analysis and Manipulation/3. Course Roadmap.mp4
801.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/12.webm
801.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/24.mp4
801.1 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/12.mp4
801.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_10.webm
800.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/14.mp4
800.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/3.webm
800.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/19.mp4
800.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_13.webm
799.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/7. John Quincy Adams on Leadership.mp4
799.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_2.webm
799.2 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/17.mp4
799.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/012-720.webm
799.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/16. The Road to Great Leadership.mp4
798.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.7.mp4
798.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/29. Service Motivation.mp4
797.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/5. Static analysis on Android.mp4
797.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/018-720.webm
797.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/5.mp4
796.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/23. Internet Gateway IGW.mp4
796.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/20.mp4
795.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.4 WPScan/SEC542- SANS OnDemand_2_2.webm
795.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/28.mp4
795.2 kB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/19.webm
795.0 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/11.mp4
794.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/026-720.webm
794.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/1. Cloud Security Operations.mp4
793.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/15.mp4
793.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/36. Performance Reviews Tips.mp4
793.6 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/12. Social Engineering/5.mp4
792.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/41.webm
791.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/30.webm
791.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/30.webm
790.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/007-720.webm
789.9 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/8.mp4
789.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/6.webm
788.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/9.mp4
788.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/36.webm
787.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/004-720.webm
786.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/32.webm
786.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/9.webm
785.3 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/43.mp4
785.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/27.webm
784.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.38.mp4
784.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/5.mp4
784.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/8.mp4
784.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/8. Securing Content with CloudFront.mp4
784.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/9.mp4
784.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/7.mp4
784.1 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/11.mp4
783.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/25.mp4
782.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/58.mp4
782.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/16. ooVoo XMPP Traffic.mp4
782.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/23.webm
781.6 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/21.mp4
780.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_19.webm
780.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/6.mp4
780.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/7. Cain.mp4
779.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/42.webm
779.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/27. CloudFormation.mp4
778.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/35.mp4
777.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/32.mp4
777.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/2.mp4
777.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_13.webm
776.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_6_2.webm
776.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/32.mp4
775.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/21.mp4
775.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.4-Vunerable Web Apps-Mutillidae/SEC542- SANS OnDemand_2.webm
774.9 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/13. Reporting/6.mp4
774.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/7. Distributed Systems/5.mp4
773.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/2. Course Roadmap.mp4
773.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/17. iOS FILESYSTEM QUICK LOOK.mp4
772.6 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/2. Network Propagation/1.mp4
772.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/24.mp4
772.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/8.mp4
771.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/21.mp4
771.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/3.mp4
771.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/29.webm
770.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/35.webm
769.8 kB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/027-720.webm
769.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/27. Step 2 Identify the Outputs.mp4
769.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/018-720.webm
768.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/022-720.webm
768.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/24.mp4
768.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/10.webm
767.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/20.mp4
767.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/021-720.webm
767.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/4.mp4
766.6 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/4.mp4
766.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/10.webm
765.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/25.webm
765.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/29. Counseling Directive and Nondirective.mp4
765.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand_7.webm
765.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/030-720.webm
765.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/010-720.webm
765.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/5. Evidence of a Wipe.mp4
764.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.6 FUZZING/SEC542- SANS OnDemand_5.webm
764.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.4-Vunerable Web Apps-Mutillidae/SEC542- SANS OnDemand_4.webm
764.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/13.mp4
763.4 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/29.mp4
763.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/23.webm
762.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/008-720.webm
762.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.16.mp4
761.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/31.mp4
760.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/32.mp4
760.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/9. Employee Engagement Strategies.mp4
759.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/24.mp4
759.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/14. Rooted Android Access.mp4
759.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/033-720.webm
759.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/18. SMS Spoofing.mp4
758.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/3. Organization Life Cycle.mp4
758.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/1.mp4
757.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/16.mp4
757.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/005-720.webm
757.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/15. MicroserviceCloud Authentication Options.mp4
757.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/7. Dalvik Android 50.mp4
756.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/005-720.webm
756.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/026-720.webm
755.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/010-720.webm
755.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/14.mp4
755.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/11.mp4
755.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/64.webm
755.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/18.webm
754.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/24.mp4
754.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/14.mp4
753.7 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.7/SANS OnDemand_01.webm
753.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/33. Section Summary.mp4
753.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/20. Gemba Board at a Glace 2.mp4
752.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/13. Security Is No Longer Just an IT Issue.mp4
752.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/19.webm
752.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/9.webm
752.3 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/12.mp4
752.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/63. Policy Pyramid.mp4
751.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/006-720.webm
751.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/21.mp4
751.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/15. ProxyDroid.mp4
751.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/26. Compliance by Design.mp4
750.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/40.mp4
750.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/3. iCloud Extractions/7. Downloading iCloud Backup Files 1.mp4
749.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/19. Identify Stakeholders.mp4
748.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/35.webm
748.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/23. Retrieving an iOS backup.mp4
748.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/24. Lab 32 Code Analysis in CodePipeline.mp4
748.4 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/3. Discovery/1.mp4
747.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/8.mp4
746.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_6.webm
746.7 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/16.mp4
746.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/33. Purpose of Policy.mp4
745.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_8.webm
745.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/2.mp4
745.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/25.mp4
745.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/006-720.webm
745.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/28. Step 3 Identify the Customers.mp4
744.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_22.webm
744.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_18_2.webm
743.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/31.webm
743.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/23.mp4
742.0 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/21.mp4
741.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/33.webm
740.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/010-720.webm
740.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.17.mp4
740.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/13. Template Meterpreter.mp4
738.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/3. Software Security Testing/5.mp4
738.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/16.mp4
738.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/12.mp4
738.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/34. Elastic Compute Cloud EC2.mp4
737.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.1.mp4
737.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/18.mp4
737.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.2 LOGIC ATTACKS/SEC542- SANS OnDemand_5_2.webm
737.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_5_2.webm
737.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/42. Lab Prerequisite Invoking API Gateway with Postman.mp4
737.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/19. Telerik JustDecompile.mp4
736.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/3. Software Security Testing/4.mp4
736.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/003-720.webm
735.7 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/1. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction.mp4
735.3 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/056-720.webm
734.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/024-720.webm
734.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.6 FUZZING/SEC542- SANS OnDemand_3_2.webm
734.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/8.mp4
734.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/14.mp4
734.1 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/24.mp4
733.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/024-720.webm
732.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_12.webm
732.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/2.mp4
732.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_11.webm
731.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/15.mp4
731.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/032-720.webm
731.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.26.mp4
730.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/40. Economic.mp4
730.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_8.webm
729.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/018-720.webm
729.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/48.mp4
728.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/6. Metrics Data Processing.mp4
728.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/19. Innovation Key Questions.mp4
728.4 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/1. About the Course/6.mp4
727.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/3. Manage Policy/8. Enforcement Consequences.mp4
726.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/011-720.webm
726.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/8. Burp Suite Proxy.mp4
726.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/25.webm
725.5 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/2.mp4
724.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/3.mp4
724.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/9.mp4
724.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand_7_2.webm
724.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/10.webm
723.6 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/026-720.webm
723.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/23.webm
723.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/9.mp4
721.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/4.mp4
720.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/44.webm
720.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/24.mp4
720.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/23.mp4
720.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/26. Internet Activity.mp4
720.0 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/021-720.webm
719.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/007-720.webm
719.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.1.mp4
718.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/7. Android Application Interaction/3. Android Inter Process Communication IPC.mp4
718.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/48.mp4
718.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/32. Capability Maturity Model Integration CMMI.mp4
717.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/024-720.webm
717.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/011-720.webm
717.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/21.webm
717.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/9.mp4
717.5 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/7. Chrome Overview/21.mp4
717.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/3. Federated and Cloud Identity/9.mp4
717.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/8/9.mp4
716.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/13.mp4
716.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_14.webm
716.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/011-720.webm
716.1 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/004-720.webm
716.0 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/30.mp4
715.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/004-720_Getting_Started_with_Unpacking.webm
715.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.6 Password Representation Formats/SEC560 - 4.6.1.mp4
715.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_9.webm
715.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/18. Android App Manipulation 2.mp4
714.6 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/10.mp4
714.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/38.mp4
714.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/024-720.webm
714.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/6.mp4
713.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/3.mp4
713.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/53.webm
712.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/020-720.webm
712.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/26.mp4
712.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_5.webm
712.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.11.mp4
712.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.12.mp4
711.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/21.webm
711.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/57. CD Store Binaries in Artifact Repository.mp4
710.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/45. Opportunities.mp4
710.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/020-720.webm
709.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/11. Plist Files.mp4
709.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/3/20.mp4
709.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/11. Lab Assignments.mp4
709.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_11.webm
707.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/6.mp4
707.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/5.mp4
706.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.7.mp4
706.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/16. zipaligning the Modified APK.mp4
706.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_18.webm
706.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_13.webm
705.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/23.webm
705.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_10.webm
705.3 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/16.mp4
705.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/80.mp4
705.3 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/9.mp4
705.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/85. Tips for Identifying Crown Jewels.mp4
704.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_4.webm
704.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/17.mp4
704.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/19.webm
703.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/7.mp4
703.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_6.webm
703.5 kB
SEC573 - Automating Information Security with Python/video/2020/Section 3/3.3 REGULAR EXPRESSIONS/24.webm
702.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/2. Rules and Regulations/1.mp4
702.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/10.mp4
701.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/34.mp4
701.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/27. Public Subnets.mp4
700.9 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/016-720.webm
700.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/29. Step 4 Identify the Inputs.mp4
700.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/24.webm
700.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/27.mp4
700.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/32.webm
699.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.7 INFORMATION LEAKAGE/SEC542- SANS OnDemand_6.webm
699.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/3.webm
699.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/052-720.webm
698.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/22.webm
698.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/9.mp4
698.2 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/007-720.webm
698.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/10.mp4
697.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/46. CloudFormation Nested Stacks.mp4
697.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/78.mp4
697.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/10. Isabel Briggs Myers on Recognizing Preference.mp4
697.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/086-720.webm
696.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/10.mp4
695.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/029-720.webm
695.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/36.mp4
695.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/44. Technological.mp4
694.6 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/23.mp4
694.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/19. Tip 5 Use Logging.mp4
694.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/14. Marissa Mayer on Sponsorship.mp4
694.4 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/8.mp4
694.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/15.mp4
694.3 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/24.mp4
693.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/6.mp4
692.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/29.mp4
692.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand_6_2.webm
692.8 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_08.webm
692.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/079-720.webm
692.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/26.mp4
692.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/015-720.webm
691.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_8_2.webm
691.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/12.mp4
691.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/13. VPC Flow Log CloudFormation Example.mp4
690.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/5.mp4
690.7 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/1.mp4
690.2 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/045-720.webm
690.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/10.mp4
690.0 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/14. Delivery/5.mp4
689.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/13.mp4
689.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/3. Federated and Cloud Identity/3.mp4
689.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_6.webm
689.2 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/017-720.webm
689.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/007-720.webm
689.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/6. Recon Tool Suites and Frameworks/7.mp4
688.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/1. Mobile Penetration Testing/3. Course Roadmap.mp4
688.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/33.mp4
688.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.1.mp4
688.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/17.mp4
687.9 kB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/003-720.webm
687.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/2.mp4
687.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/9.mp4
687.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/7.mp4
687.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/026-720.webm
686.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/6. Securing Puppet.mp4
686.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/12.mp4
685.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/010-720.webm
685.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_6_2.webm
685.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/009-720.webm
684.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/3. Federated and Cloud Identity/6.mp4
684.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.2 - Developer Created Defenses/002-720.webm
684.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/9.mp4
684.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/20.mp4
683.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/33.webm
682.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.28.mp4
681.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_5_3.webm
681.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/11.mp4
681.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_14_2.webm
681.1 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/3. Motivation and Introduction/1.mp4
680.8 kB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/011-720.webm
679.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_16_2.webm
679.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/12.mp4
679.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/004-720.webm
679.0 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/15.mp4
678.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/020-720.webm
678.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/9. Technical Metrics Examples Whats Wrong.mp4
678.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.4-Vunerable Web Apps-Mutillidae/SEC542- SANS OnDemand_3.webm
677.8 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/14.mp4
677.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/4.mp4
676.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/27.mp4
676.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/016-720.webm
676.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/016-720.webm
675.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/44. Lab 43 Using API Gateway.mp4
675.8 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/33.mp4
675.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.4 WEB APPLICATION PEN TESTER'S TOOLKIT/SEC542- SANS OnDemand_4_2.webm
674.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/43.webm
674.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/8. Examine ASL Messages.mp4
674.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_8.webm
673.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/023-720.webm
673.2 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/9. Action on Objectives/1.mp4
673.1 kB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.5 SOCKET LARGE DATA TRANSFER/04.webm
673.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/6. Embrace Style and Diversity 2.mp4
672.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/10.mp4
672.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_11_2.webm
671.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/49.mp4
671.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_15_2.webm
671.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_15.webm
671.7 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/8.mp4
671.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_16.webm
670.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.3 - Web Framework Defenses/008-720.webm
670.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/36.webm
669.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/50. Roadmap Development.mp4
669.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/20. Writing Clean Puppet Code Best PracticesStyle Guides.mp4
669.5 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/032-720.webm
669.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/12.mp4
669.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/024-720.webm
668.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/11. Rules of Engagement.mp4
666.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/13.mp4
666.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/10. MITMPROXY.mp4
666.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/2. Ephemeral Applications.mp4
665.6 kB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/020-720.webm
665.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/3. iOS App Manipulation.mp4
665.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/8. Dick Tracy TwoWay Wrist Radio.mp4
664.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/71. Dynamic Scanning in CICD Arachni.mp4
664.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/9. What Is the SANS Integrated Lab Platform.mp4
664.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/6.mp4
664.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_22.webm
663.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/27.webm
663.7 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/004-720.webm
663.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/022-720.webm
662.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_5.webm
661.9 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/14. Delivery/6.mp4
661.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/004-720.webm
661.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/10.webm
661.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/2. Essential Leadership/3. Abraham Maslow on SelfActualization.mp4
660.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.1.mp4
660.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_22.webm
660.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.12 HEART BLEED/SEC542- SANS OnDemand_5_2.webm
660.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/034-720.webm
660.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/26. Cloud Custodian CloudWatch Event Rule.mp4
660.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/015-720.webm
660.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/17.mp4
660.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/6. Vision and Mission.mp4
659.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/032-720.webm
659.8 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_06.webm
659.6 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/024-720.webm
659.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/40. Hunt the Bug TLS Configuration.mp4
659.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/54. CloudFormation Nag Running a Scan.mp4
659.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/16. Sslstrip Caution for Pen Testers.mp4
659.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/17. EC2 Container Service ECS Update DNS.mp4
658.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.7 Port Pivot Relay/SEC560 - 3.7.1.mp4
658.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/033-720.webm
658.6 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/012-720.webm
658.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/20. Undiscussables.mp4
658.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/024-720.webm
658.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/8.mp4
658.1 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/2. Defining Terms/1.mp4
658.1 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/027-720.webm
657.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/7.mp4
657.6 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/057-720.webm
657.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/5.mp4
656.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/4.mp4
656.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/17.mp4
656.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/015-720.webm
655.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_9.webm
655.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/065-720.webm
655.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/6.mp4
655.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_4_2.webm
654.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/13. Android Realm DB.mp4
654.6 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/38.mp4
654.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/19.webm
653.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/4/8.mp4
653.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/6.mp4
653.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/57.mp4
652.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/16. Code to Create Signed Cookies with a Canned Policy.mp4
652.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/7.mp4
651.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/007-720_Getting_Started_with_Unpacking.webm
651.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.1 Introduction Windows Security/1.webm
651.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_3_2.webm
650.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/1.mp4
650.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/17.webm
650.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/16. DISC Assessment Primary Applications.mp4
650.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.27.mp4
650.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/42. Social.mp4
650.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/2.mp4
649.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/28. Public Route Table.mp4
649.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_4.webm
648.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/2.mp4
648.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/2. Change Patch and Vulnerability Management/5.mp4
648.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/8. BlueGreen Deployment Azure.mp4
647.0 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/22.mp4
646.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/40.webm
645.4 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/13.mp4
645.1 kB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/001-720.webm
644.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/010-720.webm
643.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/20.mp4
643.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/35. Create Policies for Your Business.mp4
643.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/64.mp4
642.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/029-720.webm
641.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/20. Container Security Docker Security Scanning.mp4
640.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/43.mp4
640.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/24.mp4
640.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/63.mp4
640.2 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/9. File Metadata/5.mp4
639.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/25.mp4
639.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/12.mp4
639.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.3.mp4
639.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/8. Android ART Android 50.mp4
639.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/23. Mapping to Strategic Objectives.mp4
639.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/5. Handling Locked iOS Devices/1. iOS Forensics Agenda.mp4
639.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/5. Security Metrics A Critical Concern.mp4
638.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/25. Using Docker with an Artifact Repository Manager.mp4
638.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/032-720.webm
638.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/19.mp4
638.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.10 INTERCEPTION PROXIES/SEC542- SANS OnDemand_2_2.webm
638.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/22.mp4
638.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2019/504.6.pdf
638.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/86.mp4
638.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/057-720.webm
638.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/21.mp4
638.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/1. Background/16. In Summary.mp4
637.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_20.webm
637.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/007-720.webm
637.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/22.mp4
637.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.7 INFORMATION LEAKAGE/SEC542- SANS OnDemand_7.webm
635.6 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/67.mp4
635.5 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/13.mp4
635.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/1.mp4
635.2 kB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/005-720.webm
634.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/8.mp4
634.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/033-720.webm
634.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/9.mp4
634.5 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/44.mp4
634.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/24. Cloud Custodian Remediation Workflow.mp4
633.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/1. Introduction and Information/2.mp4
633.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_11.webm
632.2 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/019-720.webm
632.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/025-720.webm
631.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/011-720.webm
630.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/44.webm
630.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/12. DataUsagesqlite.mp4
629.7 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/006-720.webm
629.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/64. In Summary.mp4
628.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/11. Jabberwacky.mp4
627.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/26.mp4
627.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.40.mp4
627.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/24.webm
627.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/8.mp4
626.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/015-720.webm
626.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_8.webm
626.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/15. AWS CLI EC2 Create Key Pair.mp4
625.7 kB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/010-720.webm
625.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/42. Lab 33 Summary.mp4
625.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.17.mp4
625.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/33.mp4
625.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/20.webm
624.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_12.webm
624.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_19.webm
624.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.2 - Developer Created Defenses/004-720.webm
624.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/7.mp4
624.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/4. When to Use Automated App Analysis Tools.mp4
623.8 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/001-720.webm
623.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_12.webm
623.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/033-720.webm
622.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/12.mp4
622.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/21. MONITORING BETTERCAP.mp4
622.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/7. Distributed Systems/3.mp4
622.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/013-720.webm
621.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_5_2.webm
621.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.4 WPScan/SEC542- SANS OnDemand_3_2.webm
621.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/64. Detailed Roadmap Protect Function Example.mp4
621.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand_8_2.webm
620.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/6. Android Ouija App.mp4
620.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.1 - Introduction to Web Cryptography/003-720.webm
620.0 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/31.mp4
619.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/002-720.webm
619.7 kB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.7 IF ELIF ELSE/04.webm
619.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/19. CIS AWS Foundation Benchmarks.mp4
619.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/18.mp4
619.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/2.mp4
618.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/22.mp4
618.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/1. iOS Forensics Agenda.mp4
617.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/5.webm
617.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/1. Course Roadmap.mp4
617.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/17. Security Dashboards.mp4
617.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_9.webm
617.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/14.mp4
616.6 kB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/018-720.webm
616.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/23. Unzip FanReact.mp4
616.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.1.mp4
616.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/17.webm
616.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_9.webm
615.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/15. Lab StepbyStep Notes.mp4
615.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/6.mp4
614.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/007-720.webm
614.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/22. fridaserver.mp4
613.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/31.webm
613.7 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/21.mp4
613.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/14. Xamarin.mp4
613.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/035-720.webm
613.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/031-720.webm
613.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/011-720.webm
613.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/028-720.webm
613.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.1.mp4
612.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.1.mp4
612.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/16.mp4
612.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/23.mp4
611.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.51.mp4
611.2 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/4.mp4
610.9 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/5.mp4
610.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/019-720.webm
610.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/18.webm
610.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/036-720.webm
610.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/20. Android Exploit Mitigation.mp4
609.0 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/27.mp4
608.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/6. Active Listening Tips.mp4
608.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/30. Secure Infrastructure as Code Summary.mp4
608.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/11.mp4
608.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/16. ThirdParty Keyboards.mp4
608.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/52. Uploading SSLTLS Certificates.mp4
607.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/9.mp4
607.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/018-720.webm
607.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.4-Vunerable Web Apps-Mutillidae/SEC542- SANS OnDemand_5.webm
607.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_13.webm
607.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/18. KMS Essential Concepts 1.mp4
606.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/16. AWS GuardDuty.mp4
606.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/75. Policy Components.mp4
604.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/55.mp4
603.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/022-720.webm
603.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_21.webm
603.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/28.webm
603.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_6.webm
602.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/90. NetWars Bonus Challenges.mp4
602.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/004-720.webm
602.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_11_2.webm
602.3 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/13. Weaponization/1.mp4
602.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/5. Handling Locked iOS Devices/3. What about the Lockdown File.mp4
601.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/4.mp4
601.5 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/3. PowerShell for Active Directory/1.mp4
600.9 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/028-720.webm
600.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/019-720.webm
600.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/33.webm
600.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/16.webm
600.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/3. iOS Dynamic Analysis with Needle/1. Course Roadmap.mp4
599.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/54.mp4
599.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/001-720.webm
598.8 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/013-720.webm
598.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/006-720.webm
597.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/20. Lockdown Mode.mp4
597.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/6.mp4
596.8 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/3.mp4
596.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/002-720.webm
596.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/35. NIST SP 800190 Application Container Security Guide.mp4
596.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/024-720.webm
596.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/017-720.webm
596.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/17. Security Token Service STS API Commands.mp4
595.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.10.mp4
593.3 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/14.mp4
593.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/11. S3 ClientSide Encryption.mp4
593.0 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/41.mp4
593.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/30.webm
592.9 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/13.mp4
592.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/18.mp4
592.5 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.8/SANS OnDemand_01.webm
591.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/4.mp4
591.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/37. Motivation Is Critical.mp4
591.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/7.mp4
591.5 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/015-720.webm
591.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/23.mp4
590.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/7.mp4
590.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/018-720.webm
590.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/66. MultiYear Security Roadmap.mp4
590.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/002-720.webm
589.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/19. Identity Federation.mp4
589.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/22.mp4
588.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/27.webm
588.1 kB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.2 LAB SETUP/05.webm
587.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/23.webm
587.5 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/9. Attack Infrastructure/7.mp4
587.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/18.mp4
587.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/14.mp4
586.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/87.mp4
586.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/1. Mobile Penetration Testing/4. Mobile Penetration Testing 2.mp4
586.4 kB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/007-720.webm
586.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_15.webm
586.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/24.webm
585.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/26. CodeBuild Overview.mp4
585.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/34. Rear Admiral Grace Hopper on Leadership.mp4
585.6 kB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/014-720.webm
585.5 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/010-720.webm
585.4 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/4. iOS Evidentiary Locations/18. Location Information.mp4
585.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/010-720.webm
585.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/42. Docker Security Summary.mp4
584.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/001-720.webm
584.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/6. Monitoring and Alerting/1.mp4
583.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/64. The OneSentence Position Statement.mp4
583.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_11.webm
583.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/32. What Is Intels Roadmap for BYOD.mp4
583.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/20. Adding the Username JOIN.mp4
583.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/2.mp4
582.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/31. Creating Effective Security Policies.mp4
582.8 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/17.mp4
582.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/009-720.webm
581.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/011-720.webm
581.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/18.webm
580.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/11.mp4
580.7 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/8.mp4
580.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/028-720.webm
580.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/21. Writing Clean Puppet Code Tools.mp4
580.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/21.webm
580.2 kB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/001-720.webm
579.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/16. Phishing Messaging vs Email.mp4
579.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/5.webm
578.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/007-720.webm
578.5 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/5. Persistence/1.mp4
578.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/84. OWASP AppSec Pipeline Template.mp4
578.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/20.mp4
577.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/37.mp4
577.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/9. MyersBriggs Type Indicator MBTI.mp4
577.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/4. App Report Cards.mp4
577.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/15.mp4
577.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/31.webm
576.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/013-720.webm
576.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/021-720.webm
576.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/17.webm
576.5 kB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/001-720.webm
576.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/18. BetterCap.mp4
575.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_9.webm
575.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/19.webm
574.9 kB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/013-720.webm
574.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/7.mp4
574.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/2. Change Patch and Vulnerability Management/2.mp4
574.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/20.mp4
574.3 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/013-720.webm
573.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/61.mp4
573.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/21.mp4
573.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/15.mp4
573.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/018-720.webm
573.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/48. PharmaCo Case Scenario.mp4
572.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/43. Security Roadmap.mp4
572.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/16.mp4
571.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/6/33.mp4
571.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/1. Course Roadmap .mp4
571.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_9_2.webm
571.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_10_2.webm
570.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/21.mp4
570.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_8_2.webm
570.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/1. Leadership Management Competencies.mp4
569.9 kB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/10.webm
569.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/15.mp4
569.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/36.mp4
568.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/34. Risks of Frequent Change.mp4
567.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/31.webm
566.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/60.mp4
566.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/24.webm
566.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/13. API Gateway ProsCons.mp4
565.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/037-720.webm
565.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/15. Course Roadmap 2.mp4
565.5 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/054-720.webm
565.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_26.webm
564.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/3. Objection Connecting.mp4
564.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/2. Change Patch and Vulnerability Management/9.mp4
564.5 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/8.mp4
564.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/001-720.webm
564.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/024-720.webm
564.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.16.mp4
563.8 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/1.mp4
563.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_16.webm
563.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/10.mp4
563.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/3.mp4
562.9 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/1.mp4
562.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/15. Traffic Analysis.mp4
561.2 kB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/014-720.webm
560.4 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/62.mp4
560.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/009-720.webm
560.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/50.mp4
560.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/42.webm
560.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/11.mp4
559.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/42. Summary of AWS Security Issues.mp4
559.7 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/6. Defense Evasion and Execution/8.mp4
558.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/1. Course Roadmap.mp4
558.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/002-720.webm
558.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/022-720.webm
557.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/109.mp4
557.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_10_2.webm
557.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/16. Git Workflow CommitShare a Change.mp4
557.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/22.mp4
557.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/8. Writing Dockerfiles Best Practices.mp4
556.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/2. Course Roadmap 1.mp4
555.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/1. Dynamic Mobile Application Analysis and Manipulation/2. Table of Contents.mp4
555.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/4. I2P Invisible Internet Project/1.mp4
555.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/016-720.webm
554.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/21.webm
554.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.18.mp4
554.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/18. Stakeholder Management Key Components.mp4
554.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.8.mp4
554.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/19.mp4
553.7 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/001-720.webm
553.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/3. Linkedin Data/1.mp4
553.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/17.mp4
553.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/19.webm
553.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/23.mp4
552.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/12.webm
552.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/9.mp4
551.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/45.mp4
551.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/22.mp4
551.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.10 API ATTACKS/SEC542- SANS OnDemand_4_2.webm
551.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/23.mp4
551.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/16.mp4
551.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_12.webm
551.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/17.mp4
551.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/5. PortSwigger Burp Suite.mp4
550.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.3.mp4
550.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/23. Security Framework.mp4
550.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_3_2.webm
550.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/24.mp4
550.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/013-720.webm
550.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/8.mp4
550.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/20. Leadership Styles The Early Study.mp4
549.4 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.3/007-720.webm
548.2 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/21. Aligning the Tables with Matching Column Entries.mp4
547.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/16.webm
547.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/19.mp4
547.4 kB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/019-720.webm
547.4 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/6. Forensic Capstone Prep/1. ThirdParty Application Analysis.mp4
547.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_2.2.webm
547.1 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/001-720.webm
546.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/35.webm
546.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_8_2.webm
545.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/039-720.webm
545.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/022-720.webm
545.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/32.mp4
544.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/012-720.webm
544.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/30. iExplorer Backup Analysis.mp4
543.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/34. Market and Communicate to Employees.mp4
543.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/9.mp4
542.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.1.mp4
542.8 kB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/022-720.webm
542.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/003-720.webm
542.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.58.mp4
542.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/12.mp4
542.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/1. Introduction and Information/1.mp4
542.0 kB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/028-720.webm
542.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/20. Extending SAST in CodePipeline Configure PostBuild.mp4
541.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/10. Getting Started.mp4
541.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/014-720.webm
541.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/44.webm
541.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/15.mp4
540.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/10.mp4
539.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/8.mp4
538.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/12. Adding SAST to CodePipeline New CodeBuild Project.mp4
538.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/6.mp4
537.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/18.mp4
537.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/38.webm
537.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/5.mp4
537.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/30.webm
537.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/30. Counseling Steps.mp4
536.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/021-720.webm
536.7 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/13.mp4
536.6 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/5. Secure Chat Applications/1. ThirdParty Application Analysis.mp4
536.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.3 - Web Framework Defenses/007-720.webm
536.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/17.webm
535.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/25.webm
535.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/6.mp4
535.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/18.mp4
535.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/006-720.webm
535.1 kB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/09.webm
534.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.3-Bypass Flaws/SEC542- SANS OnDemand_3.webm
534.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/15.webm
534.4 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/023-720.webm
534.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/67. Related Documents 2.mp4
532.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/29.mp4
531.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/71.mp4
531.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/012-720.webm
531.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/5. Taking Excellent Notes/24.mp4
531.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/16.mp4
530.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/44.mp4
530.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/034-720.webm
529.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/8.mp4
529.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/009-720.webm
529.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.44.mp4
529.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/50. Vulnerability Management in DevOps.mp4
529.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_1.webm
528.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/1.mp4
527.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/3. Lab 11 Deployment Kata.mp4
527.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/014-720.webm
526.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/1.mp4
525.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/1.mp4
524.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.3 Service Packs, Hotfixes, and Backups/8.webm
523.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_10.webm
523.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/016-720.webm
523.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_3_3.webm
522.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/029-720.webm
522.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/8.mp4
522.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/9. QARK.mp4
521.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.86.mp4
520.9 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/35.mp4
520.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.10 API ATTACKS/SEC542- SANS OnDemand_5_2.webm
520.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/6.mp4
520.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/2. Rules and Regulations/7.mp4
520.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/58. Lab Prerequisites Static Code Analysis Phan.mp4
519.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/5.webm
519.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/026-720.webm
519.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/023-720.webm
518.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/17.webm
518.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/91. Course Roadmap 5.mp4
517.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.10 API ATTACKS/SEC542- SANS OnDemand_6_2.webm
517.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/9.webm
516.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/1. Course Roadmap.mp4
516.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/25.webm
516.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/2. Security Monitoring.mp4
516.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_7.webm
515.5 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/4. Active Directory Permissions and Delegation of Authority for Damage Containment/8.mp4
515.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/033-720.webm
515.2 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/039-720.webm
515.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/5. Effective Communication/15. What Is a Great Presentation.mp4
515.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/4. The War on Cleartext Traffic.mp4
514.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/3. Configuration Management as Code/18. Puppet Package File Service Pattern.mp4
514.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/24.webm
514.2 kB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/008-720.webm
514.1 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/1.mp4
513.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/7.mp4
513.3 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/21.mp4
513.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/6. Geolocation/10.mp4
513.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/7. Android Forensics Overview/1. Smartphone Overview Fundamentals of Analysis SQLite Introduction Android Forensics Overview and Android Backups.mp4
511.9 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/2. Registry Forensic Analysis/4.mp4
511.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/30.webm
511.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/47.mp4
511.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/1.mp4
511.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/28.mp4
511.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/9.mp4
509.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/17.mp4
509.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/1.mp4
509.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/015-720.webm
508.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/14.mp4
508.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.6 FUZZING/SEC542- SANS OnDemand_4_2.webm
508.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_21.webm
508.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/023-720.webm
508.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/69.mp4
507.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/26. Zillow for Android.mp4
507.9 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/12.mp4
507.3 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/12. Analysis and Response/1.mp4
507.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/20. Using KMS.mp4
506.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/4. Data Storage on Android/21. Course Roadmap 2.mp4
506.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/12. Setting Instance Variables.mp4
505.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/25.webm
505.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/10. Key Management.mp4
505.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/80. LongRunning Security Tests in CD.mp4
504.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/3.mp4
504.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/14. COURSE RESOURCES AND CONTACT INFORMATION.mp4
504.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/19. Extending SAST in CodePipeline Set Build Trigger.mp4
504.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/7. How to Make Policy Measurable.mp4
503.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/40.mp4
503.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.84.mp4
503.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/23.webm
503.1 kB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/001-720.webm
502.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/34.webm
502.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/63.mp4
502.2 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/026-720.webm
502.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/7. Identify URL Handlers.mp4
501.3 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/7. Credential Access/1.mp4
501.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/56. Lab 22 CloudFormation Automation.mp4
500.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/4. Detection Logging and Monitoring/1.mp4
500.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/15.mp4
500.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/11. Adding SAST to CodePipeline.mp4
500.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/20.webm
499.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/27.webm
499.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.11.mp4
499.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_7.webm
499.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/027-720.webm
498.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/2. Data Privacy and Ownership/1.mp4
498.8 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/3. iCloud Extractions/4. Accessing iCloud Backup Files 2.mp4
498.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/2.mp4
498.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/005-720.webm
497.7 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/7.mp4
497.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/1.mp4
497.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/5. Embrace Style and Diversity 1.mp4
497.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/17.mp4
496.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/33. Creating the API Gateway.mp4
496.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/28.mp4
496.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/3.mp4
496.2 kB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/030-720.webm
496.2 kB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/010-720.webm
495.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/7. Wireshark.mp4
495.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/28. MicroserviceContainer PKI Deployment.mp4
495.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/35.webm
494.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/33. Dunder Mifflin Virtual Private Cloud with ECS.mp4
494.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/026-720.webm
494.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/82.mp4
493.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/1.mp4
493.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/60.webm
493.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/8.mp4
492.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/22. User Dictionary Data.mp4
492.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/019-720.webm
492.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/6. Psychology Is .mp4
491.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/22.webm
491.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/20.webm
490.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/78. Approaches to Building a Security Business Case 3.mp4
490.9 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/1.mp4
490.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/3. Mobile Malware Incentives.mp4
490.3 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/24.mp4
489.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/77.mp4
489.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/15. Simple Ettercap Usage.mp4
489.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/51. Managing Vulnerabilities using OWASP DefectDojo.mp4
489.7 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/2. ThirdParty Application Artifacts.mp4
489.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/68.mp4
489.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_2_2.webm
489.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/6. Victim ARP Table.mp4
489.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.71.mp4
487.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/18.webm
487.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/1. Why Choose Leadership/24. Power Versus Leadership.mp4
486.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/010-720.webm
486.8 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/7. Roles and Responsibilities/1.mp4
486.4 kB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/005-720.webm
485.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/36.mp4
485.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/2. Application Security Verification.mp4
484.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/9. TrojanSMSAndroidOSFoncy.mp4
484.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/013-720.webm
484.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/13.webm
484.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/3. MITM User Space Tools.mp4
483.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/8.mp4
483.4 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/14. Delivery/1.mp4
482.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/1. The Surface Deep and Dark Webs/3.mp4
482.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/46.webm
482.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/55. CloudFormation Nag Suppressing False Positives.mp4
482.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/7.mp4
482.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/10. DevOps Audit Defense Toolkit How to Use It.mp4
482.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/015-720.webm
481.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/10. Certificate Pinning.mp4
481.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/9.webm
480.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/26.mp4
480.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/14.mp4
480.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/8.mp4
480.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/39. Hunt the Bug Method Settings.mp4
480.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/18.webm
479.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/016-720.webm
479.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/11. Lab 10 Getting Started.mp4
479.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/2.mp4
479.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/2.mp4
478.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/6.webm
478.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.41.mp4
478.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/5. Summary/5. Security Cannot Be a Blocker.mp4
477.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/8.mp4
477.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/12. Androsim Compare Two APKs.mp4
477.2 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.2/001-720.webm
476.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/1/27.mp4
476.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_11.webm
475.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/10.webm
475.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/31.mp4
475.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/86. CD Staging and Rehearsal.mp4
475.0 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.12/013-720.webm
474.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_20.webm
474.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/7. Security Testing in CodePipeline.mp4
474.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/41. Lab Prerequisite Invoking the API Gateway Endpoint.mp4
474.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/25.mp4
473.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/18.webm
473.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/38. CloudFormation EC2 Instance Profile S3 Example.mp4
472.9 kB
FOR585 - Advanced Smartphone Forensics/video/2020/6. Smartphone Forensic Capstone Exercise/1. Smartphone Forensic Capstone Exercise/1. Smartphone Forensic Capstone Exercise.mp4
472.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/12. Problems with Certificate Pinning.mp4
471.8 kB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.2 LOOPS; FOR AND WHILE/12.webm
471.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/1.mp4
471.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/10.webm
471.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/7. Distributed Systems/4.mp4
469.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/42. Time Savers.mp4
469.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/3. Scenario and Start/7.mp4
468.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/44. CloudFormation Outputs.mp4
468.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/1.mp4
468.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/11. Reverse Engineering iOS Apps.mp4
468.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_9.webm
468.4 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/60.mp4
468.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/1.mp4
468.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/3. Software Security Testing/1.mp4
467.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/7.webm
467.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/3.mp4
466.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/14.mp4
466.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/26.webm
466.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/3. Security Audits and Key Security Processes/5.mp4
465.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.7.mp4
465.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.2 TESTING SOFTWARE CONFIGURATION/SEC542- SANS OnDemand_4_2.webm
465.5 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/16. Matching on Like COLUMN Entries.mp4
465.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/27.webm
465.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/12.mp4
464.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/1. Security Model Fundamentals/1.mp4
464.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/10. AWS Access Keys.mp4
464.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/28. CALMS Culture DevOps Culture and Security.mp4
464.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/11. Sslstrip.mp4
464.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/10. CloudWatch Graphing a Metric.mp4
464.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_16.webm
463.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/21.webm
463.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/19.mp4
462.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/1.mp4
462.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.21.mp4
461.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/15.mp4
459.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/47. CloudFormation Help Getting Started.mp4
459.4 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/68.mp4
458.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/2. Security in Cloud CICD/5. Code Fix for SQL Injection.mp4
458.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/018-720.webm
458.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/058-720.webm
457.2 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/1. ThirdParty Applications Overview/23. Decoding the Data.mp4
456.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/8. Where to go from here/7. Conclusion.mp4
455.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/25. Jenkins Pipeline Stages 2.mp4
455.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/10. NetworkMiner.mp4
455.2 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/25.mp4
454.3 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/10.mp4
454.3 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/8. Rules of Engagement/1.mp4
454.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/28.webm
453.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/2. Continuous Auditing/1. Course Roadmap.mp4
452.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/035-720.webm
452.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/12. MyersBriggs Type Indicator MBTI Personality Types.mp4
451.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/46. CMMI Maturity Levels.mp4
451.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/018-720.webm
450.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.34.mp4
450.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/2.mp4
449.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/1.mp4
448.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/27.mp4
448.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/5.mp4
448.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/7/5.mp4
447.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/002-720.webm
447.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/11. Azure Application Gateway and Web Application Firewall.mp4
447.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/45.mp4
447.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/2.mp4
446.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/10.mp4
446.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/12. Realistic 1.mp4
446.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/41.mp4
445.8 kB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/13.webm
445.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.25.mp4
445.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/37.mp4
444.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/12.mp4
444.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/68.mp4
444.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/7. CrossSite Request Forgery CSRF Review.mp4
443.7 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/IOS IPv4 Access Lists.pdf
443.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/25.webm
443.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/35.webm
442.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/6. Security Controls Mapped to CD Stages.mp4
441.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/9.mp4
441.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/062-720.webm
440.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/18.mp4
440.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/001-720.webm
440.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/020-720.webm
440.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.25.mp4
440.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_3_2.webm
439.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/1. Course Introduction/2.mp4
438.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/7. Professional ethics/1.mp4
438.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/13.webm
437.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/007-720.webm
437.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/10. Course Roadmap 2.mp4
437.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/1.mp4
436.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/1.mp4
436.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_2_2.webm
436.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/21.mp4
436.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/1. Security Assessment Strategies/1.mp4
435.2 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/38.mp4
435.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/1. Static Application Analysis/1. SEC5753.mp4
434.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/12. Ettercap.mp4
434.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.14.mp4
434.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_13.webm
434.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/3. Continuous Security Monitoring/1. Course Roadmap .mp4
433.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/4. Lab 54 Environment Tear Down/1. Course Roadmap.mp4
432.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.106.mp4
432.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/17.mp4
432.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/015-720.webm
431.2 kB
SEC573 - Automating Information Security with Python/video/2020/Section 4/4.4 DATABASE OPERATIONS/27.webm
431.0 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/081-720.webm
430.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_2_2.webm
429.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/4.webm
429.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/023-720.webm
429.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/24.webm
428.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/6. Determining Your Threat Profile/1.mp4
428.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/29. Security Challenges in DevOps.mp4
428.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/016-720.webm
427.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/4.mp4
427.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/002-720.webm
426.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/9. appidlestatsxml.mp4
426.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/4. Malware and Spyware Forensics/25. Unzipped ipa file.mp4
424.9 kB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/007-720.webm
424.8 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/025-720.webm
424.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/019-720.webm
423.4 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/016-720.webm
423.2 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/23.mp4
423.1 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/082-720.webm
422.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/1.mp4
422.1 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/019-720.webm
421.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/5.mp4
421.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/15. Git Workflow Clone and Edit.mp4
420.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_7_2.webm
420.4 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/2. The SIFT Workstation/1. Smartphone Overview Fundamentals of Analysis SQLite Introduction Android Forensics Overview and Android Backups.mp4
419.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/24.webm
417.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/089-720.webm
417.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/16. Monitoring Ettercap.mp4
416.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/14. Method Swizzling.mp4
416.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/1. Mobile Penetration Testing/1. Mobile Penetration Testing.mp4
416.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/16. Course Roadmap 2.mp4
415.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/40. Commit Stage Executing Unit Tests.mp4
414.5 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/9. Physical Analyzer Key Features 1.mp4
414.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/13. Course Roadmap 2.mp4
413.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.11.mp4
412.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/26. Lab 44 Serverless Security.mp4
412.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.4.mp4
411.6 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/037-720.webm
411.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/1.mp4
411.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/4.mp4
410.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/4. Baselines and Best Practices/9.mp4
410.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/44.mp4
410.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/6.webm
409.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/12.mp4
408.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/083-720.webm
408.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/9. Site and Facility Design/4.mp4
408.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/12.mp4
407.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/16.mp4
407.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.1 - Introduction to SEC642/006-720.webm
406.6 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/105-720.webm
406.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/22.mp4
406.1 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/35.mp4
405.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/33.webm
405.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/11. Benjamin Franklin on Planning.mp4
405.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/25. Frida CLI 2.mp4
405.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/1.mp4
405.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/5. Advanced Decoding and Traces of User Activity/1. Android Forensics Agenda.mp4
405.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/9. TLS Certificate Handling.mp4
404.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/20. Tip 6 Understand then Rename Methods.mp4
404.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/43.mp4
404.1 kB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/028-720.webm
403.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/010-720.webm
403.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/3.mp4
402.6 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/Web Application Audit Checklist.pdf
402.4 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/28.mp4
402.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/15.webm
401.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_12_2.webm
401.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/27.mp4
400.9 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.1/002-720.webm
400.2 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/017-720.webm
399.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/015-720.webm
399.6 kB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/018-720.webm
399.6 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/018-720.webm
398.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/7.mp4
398.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/17.mp4
397.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/028-720.webm
397.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/4.mp4
396.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/30. The Cone of Plausibility.mp4
396.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/002-720.webm
396.4 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/3. Smartphone Overview Acquisition Terms and Methodologies/11. Method 2 OnOff Rule for Smartphone Collection.mp4
395.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/36.webm
395.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/4. ProGuard.mp4
395.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/7. Continual Learning External Awareness.mp4
394.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/3.mp4
394.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/4. Integrating Security into Continuous Delivery.mp4
393.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/14.mp4
393.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/1.mp4
392.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_4.webm
392.3 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/020-720.webm
392.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/58. Leonardo Da Vinci on Simplicity.mp4
391.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/032-720.webm
391.3 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/13. Reporting/1.mp4
391.2 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/3. Messaging Applications and Recovering Attachments/22. JOIN the ZMEMBER Table.mp4
391.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/023-720.webm
390.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/62. Course Roadmap 4.mp4
390.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.5.mp4
390.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/31.mp4
389.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/008-720.webm
389.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/23. iOS RATs.mp4
389.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/004-720.webm
388.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/035-720.webm
388.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/59. Lab Prerequisites Running Phans CLI.mp4
387.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/034-720.webm
387.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.1 Introduction Defense-in-Depth and Attacks/1.webm
386.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/15.mp4
385.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/3. Risk management/35.mp4
385.7 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/26.mp4
385.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/22. Repeat This Process.mp4
385.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.35.mp4
385.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/34. Managing Code Reviews with Workflow Automation.mp4
384.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/080-720.webm
384.7 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/6.mp4
384.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/014-720.webm
383.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/022-720.webm
383.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/6.mp4
383.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/4.mp4
383.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/11.mp4
382.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/3. Build Effective Teams/7. Course Roadmap 2.mp4
382.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/44.mp4
382.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/012-720.webm
381.9 kB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/009-720.webm
381.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.16.mp4
381.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/5. Threat modeling/25.mp4
380.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/85.mp4
379.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_3.webm
379.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/54. Fitbit Case Example Executive Presentation.mp4
379.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/1.mp4
378.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/16. Lab Resources and Setup.mp4
378.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/5.mp4
378.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/61. Fitbit Case In Six Months.mp4
378.2 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/13.mp4
377.9 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/041-720.webm
377.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/3. Rooting Android/11. BLU R1 HD Root Process 4.mp4
376.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/34.webm
376.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/8. Where to go from here/3. SANS Penetration Testing Curriculum.mp4
376.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_2_2.webm
375.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/7. HTTPS Intercept.mp4
375.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.18.mp4
374.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/24.mp4
374.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/22.mp4
374.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/11.mp4
374.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/3.mp4
374.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/10.webm
373.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.8.mp4
373.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/19. Mission Statement Keyword Examples.mp4
372.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/9.mp4
372.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/40.webm
371.9 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/regularexpressions.pdf
370.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/27.webm
369.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/016-720_Analyzing_Multi-Technology_Malware.webm
368.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/13.mp4
368.2 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/1.mp4
368.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/5. Basic Data Addresses and Phone Numbers/4.mp4
367.7 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/013-720.webm
367.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/3.webm
367.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_15.webm
366.8 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/8. Android Backups/1. Smartphone Overview Fundamentals of Analysis SQLite Introduction Android Forensics Overview and Android Backups.mp4
366.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/23.mp4
365.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/28. Cloud Custodian CloudWatch Event Target.mp4
365.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/4. Instagram/1.mp4
364.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/30. Step 5 Identify the Suppliers.mp4
364.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/1. Deployment Orchestration/12. BlueGreen Deployment AWS.mp4
364.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/17.webm
363.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/23. Lab Environment Jenkins Pipeline.mp4
362.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/5.mp4
362.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/009-720.webm
362.2 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_01.webm
361.6 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/5. Persistence/8.mp4
361.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/008-720.webm
360.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/011-720.webm
360.5 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/4. Mobile Browsers/1. ThirdParty Application Analysis.mp4
360.5 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/10. File Carving/5.mp4
360.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.5-Command Injection/SEC542- SANS OnDemand.webm
360.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/37.mp4
359.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/1. Purpose of Policy/27. Course Roadmap 2.mp4
359.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/077-720.webm
359.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/003-720.webm
358.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/8.mp4
358.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/11. Microservice Security Controls.mp4
358.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/2. The Dark Web/1.mp4
358.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/014-720.webm
358.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/11.webm
357.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/14.mp4
356.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/012-720.webm
355.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/26.webm
355.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/011-720.webm
355.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/38.mp4
355.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_5.webm
354.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/037-720.webm
354.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/6. Capstone Capture and Present the Flags/3. Scenario and Start/1.mp4
354.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.25.mp4
353.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/081-720.webm
353.1 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/11.mp4
353.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/13. Social Facilitation.mp4
352.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.8.mp4
352.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/011-720.webm
352.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/15. Cydia App Store.mp4
351.7 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/011-720.webm
351.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_2_2.webm
350.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.31.mp4
350.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/49. Dunder Mifflin Virtual Private Cloud.mp4
348.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/31. ThirdParty Solutions.mp4
348.8 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/036-720.webm
348.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/12.mp4
348.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.5 ANALYZING SPIDERING RESULTS/SEC542- SANS OnDemand_5_3.webm
348.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand_12.webm
347.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/011_526/006-720.webm
347.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/54.mp4
347.2 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/030-720.webm
346.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/021-720.webm
346.6 kB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/021-720.webm
346.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/2. Security Evaluation Models/2.mp4
345.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/11.mp4
345.1 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/Active Directory Cheat Sheet.pdf
344.2 kB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/6. Google Cloud Extractions and Analysis/1. Android Forensics Agenda.mp4
344.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.4.mp4
344.2 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/002-720.webm
344.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.17.mp4
343.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/19.webm
343.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/46.mp4
342.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/001-720.webm
341.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/016-720.webm
341.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/1. Course Roadmap 1.mp4
341.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/4.mp4
340.7 kB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/017-720.webm
340.6 kB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/002-720.webm
340.4 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/30.mp4
339.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_12.webm
339.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/012-720.webm
338.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/012-720.webm
338.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/9.mp4
337.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/52.mp4
337.4 kB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/1. Android Forensics.mp4
337.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.7 HTTP SYNTAX AND MESSAGING/SEC542- SANS OnDemand.webm
337.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/33.webm
335.9 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/12.mp4
335.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_4.webm
335.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/65.mp4
334.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/019-720.webm
333.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/021-720.webm
333.7 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/10. Physical Analyzer Key Features 2.mp4
333.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/2.mp4
333.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/4. Risk and acquisition/5.mp4
332.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/47.mp4
332.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_1.webm
332.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/11.mp4
332.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/6. SQLite Databases Overview/1. Smartphone Overview Fundamentals of Analysis SQLite Introduction Android Forensics Overview and Android Backups.mp4
331.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/014-720.webm
330.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/9. Cloud Infrastructure as Code Services.mp4
330.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/5/6.mp4
329.9 kB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/001-720.webm
329.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/2. Secure Content Delivery/1. Course Roadmap 1.mp4
329.5 kB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/012-720.webm
329.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/16.mp4
328.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/19.mp4
328.8 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/1.mp4
328.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/076-720.webm
328.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/51.mp4
327.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/007-720.webm
327.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/17. Lambda Logging and Auditing.mp4
325.8 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/009-720.webm
325.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/007-720.webm
325.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/027-720.webm
325.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.10 BURP INTRUDER/SEC542- SANS OnDemand_5.webm
325.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/030-720.webm
325.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/015-720.webm
325.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/4. Engaging Teams/20. Course Roadmap 2.mp4
324.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/5. Summary/1. Course Roadmap.mp4
324.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/010-720.webm
324.3 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/5. Mounting Disk Images/11.mp4
324.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/25.mp4
323.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/5.mp4
323.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/1.mp4
323.8 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/3. WMI and Active Directory Scripting/2. PowerShell for Local Users and Groups/1.mp4
323.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/14.mp4
322.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/18. Course Roadmap 2.mp4
322.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.2 - Developer Created Defenses/005-720.webm
322.3 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/4. PowerShell and Windows Logging/14.mp4
321.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.16.mp4
321.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.19.mp4
321.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 6/6.1 CAPTURE THE FLAG/SEC542- SANS OnDemand_3.webm
321.3 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/38.mp4
319.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/23.mp4
319.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/014-720.webm
319.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_17_2.webm
319.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/002-720.webm
319.0 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/27.mp4
318.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/001-720.webm
318.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/021-720.webm
318.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/025-720.webm
318.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/1. Runtime Security Automation/8. Fixing CSRF.mp4
317.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/016-720.webm
317.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/7.webm
316.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_10.webm
316.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/012-720.webm
316.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_2.1.webm
316.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/34.mp4
315.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_25.webm
315.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/015-720.webm
315.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/1. Secure Resource Provisioning/21.mp4
315.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/001-720.webm
314.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/3. Data Remanence and Retention/8.mp4
314.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/23. Hunt the Bug Lambda Function Concerns.mp4
314.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/017-720.webm
314.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/014-720.webm
314.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/46.mp4
313.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/1. Course Roadmap.mp4
313.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/10.mp4
313.8 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/2. iOS Device Acquisition Considerations/1. iOS Forensics Agenda.mp4
313.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/078-720.webm
313.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/34. Module Summary.mp4
313.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/045-720.webm
313.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_9.webm
313.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/001-720.webm
312.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/34.webm
312.5 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 2. Enriching and Managing Logs/2.8/001-720.webm
311.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.4 Password Attack Tips/SEC560 - 4.4.1.mp4
311.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.5 ANALYZING SPIDERING RESULTS/SEC542- SANS OnDemand.webm
311.4 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/3. iOS File System Structures/1. iOS Forensics Agenda.mp4
311.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/028-720.webm
309.8 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.6/SANS OnDemand_09.webm
309.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/3. Unity Framework.mp4
309.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/014-720.webm
308.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/004-720.webm
308.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/4. Leadership Management Competencies/6. Leading Change/16. Be Wary of Saying Something Is Easy.mp4
308.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/38.webm
308.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/030-720.webm
308.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/3. iCloud Extractions/8. Downloading iCloud Backup Files 2.mp4
308.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/032-720.webm
307.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/046-720.webm
307.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/5.mp4
307.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/19.mp4
307.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_8.webm
306.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/5. Remote Access and Secure Communications Channels/1.mp4
306.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_11.webm
306.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/017-720.webm
305.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.1 - Introduction to Alternative Web Interfaces/001-720.webm
305.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/032-720.webm
305.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/029-720.webm
305.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/008-720.webm
305.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.7 INFORMATION LEAKAGE/SEC542- SANS OnDemand.webm
304.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/2.mp4
303.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/008-720.webm
303.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.10 API ATTACKS/SEC542- SANS OnDemand_3_3.webm
303.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/001-720.webm
303.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_2.webm
303.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/2.webm
303.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/33.webm
302.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_5.webm
302.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/008-720.webm
302.7 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/024-720.webm
302.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/017-720.webm
302.1 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/34.mp4
301.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/18. iOS App Manipulation 2.mp4
301.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/055-720.webm
301.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/009-720.webm
301.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/26.mp4
301.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/1. Course and Lab Setup/3. Course Roadmap.mp4
301.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/35.webm
300.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.1.mp4
300.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/022-720.webm
299.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/017-720.webm
299.2 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/5. Visioning.mp4
299.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/14.webm
298.4 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/Active Directory Cheat Sheet_1.pdf
298.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/2/79.mp4
297.9 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/12.mp4
297.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/6. Workshop Platform.mp4
297.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.1.mp4
297.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/001-720.webm
297.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.1.mp4
296.2 kB
SEC455 - SIEM Design and Architecture/video/2018/Day 1. Distributed Search and Visualization/1.4/SANS OnDemand_01.webm
296.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/24. Hunt the Bug Lambda Execution Role.mp4
296.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_5.webm
296.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/21. Adobe PhoneGap.mp4
295.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/031-720.webm
295.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_4_2.webm
295.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/040-720.webm
294.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.5 ANALYZING SPIDERING RESULTS/SEC542- SANS OnDemand_6_2.webm
293.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/16.mp4
293.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/14.mp4
292.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/30.webm
292.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/021-720.webm
292.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/26.mp4
292.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/43.mp4
291.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/57.mp4
291.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand_8.webm
291.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_2_2.webm
291.1 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/69.mp4
290.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/6.mp4
290.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.2 TESTING SOFTWARE CONFIGURATION/SEC542- SANS OnDemand_5.webm
290.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_17.webm
290.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/024-720.webm
290.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/018-720.webm
289.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/084-720.webm
289.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.2 APPLICATION ASSESSMENT METHODOLOGIES/SEC542- SANS OnDemand_14.webm
289.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/007-720.webm
289.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/016-720.webm
288.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/001-720.webm
288.0 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/10.mp4
288.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_12.webm
287.5 kB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/042-720.webm
287.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/014-720.webm
286.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/023-720.webm
286.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.2 Exploit Categories/SEC560 - 3.2.1.mp4
286.1 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/1.mp4
285.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/026-720.webm
285.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_6_2.webm
285.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/009-720.webm
285.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/004-720.webm
284.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/4. Routing/1.mp4
284.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/8. Avatars and Reverse Image Searches/14.mp4
284.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_2.webm
284.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/18.mp4
283.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/5. ooVoo.mp4
283.8 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/4. Smart Token Multifactor Authentication/1.mp4
283.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/005-720.webm
282.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/029-720.webm
281.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.9 John the Ripper/SEC560 - 4.9.1.mp4
281.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/031-720.webm
281.1 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/10.mp4
280.7 kB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/018-720.webm
280.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.8 HTTP SEMANTICS/SEC542- SANS OnDemand_5.webm
280.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/13.mp4
280.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/22.webm
279.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/025-720.webm
278.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/20. Course Roadmap 2.mp4
278.1 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/10. Target Manipulation Collection and Exfiltration/8.mp4
278.0 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/12.mp4
277.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/11.mp4
277.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/021-720.webm
277.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/004-720.webm
276.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand.webm
275.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_2_2.webm
275.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/016-720.webm
274.8 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/14.mp4
274.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/011-720.webm
274.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/012-720.webm
273.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/002-720.webm
273.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/5.mp4
273.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/005-720.webm
273.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/25.mp4
273.0 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/007-720.webm
272.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/005-720.webm
272.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/1. Securing Cloud Architecture/39. Hunt the Bug Instance Launch Configuration Concerns.mp4
272.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.2 TESTING SOFTWARE CONFIGURATION/SEC542- SANS OnDemand_3_2.webm
272.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/014-720.webm
272.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/48.mp4
270.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/31. Lab 22 Draft the Mission.mp4
270.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.1.mp4
269.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_2.webm
269.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/1. Software and Security Development Lifecycle/7.mp4
269.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/032-720.webm
269.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/007-720.webm
269.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/1. Course Roadmap 1.mp4
269.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/78. Vulnerability Management Policy Debrief.mp4
268.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/9. Personnel security issues security education training and awareness/2.mp4
268.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.1.mp4
268.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/016-720.webm
267.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/010-720.webm
267.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/023-720.webm
267.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/022-720.webm
267.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/030-720.webm
266.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/001-720.webm
266.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/12. Monitoring Services.mp4
266.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/1. Introduction to Smartphone Overview Fundamentals of Analysis SQLite/5. FOR 585 Smartphone Forensic Analysis InDepth.mp4
265.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/015-720.webm
265.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/36.webm
265.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_4.webm
265.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/020-720.webm
265.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/001-720.webm
264.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/018-720.webm
264.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/034-720.webm
264.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/011-720.webm
264.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.1.mp4
263.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/023-720.webm
263.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/41.mp4
263.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/001-720.webm
263.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand.webm
263.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/020-720.webm
263.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.3 - Web Framework Defenses/001-720.webm
262.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/001-720.webm
262.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/104-720.webm
262.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/010-720.webm
262.5 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/42.mp4
262.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/096-720.webm
262.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/087-720.webm
262.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.2 - Developer Created Defenses/001-720.webm
262.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/001-720.webm
262.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/011-720.webm
262.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.11 Sniffing - Cracking/SEC560 - 4.11.9.mp4
262.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/2. Develop the Plan/49. Maturity Model Example 2.mp4
261.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/072-720.webm
261.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/37.webm
261.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/060-720.webm
261.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/30. Course Roadmap 2.mp4
261.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/003-720.webm
261.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/3.webm
261.2 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/4. Data Protection/16. Creating an Encrypted RDS Instance 1.mp4
261.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/5. Unity Code.mp4
260.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/029-720.webm
260.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/008-720.webm
260.3 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/10. Target Manipulation Collection and Exfiltration/1.mp4
260.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/14.webm
260.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.5 - Crypto Exploit Concepts/001-720.webm
260.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/025-720.webm
259.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/011-720.webm
259.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/010-720.webm
259.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/030-720.webm
259.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/58.webm
259.3 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/3. iCloud Extractions/1. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction.mp4
259.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/013-720.webm
259.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/001-720.webm
259.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/041-720.webm
259.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.4 - Identifying Crypto/001-720.webm
258.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/036-720.webm
258.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/020-720.webm
258.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/001-720.webm
258.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/017-720.webm
258.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/001-720.webm
258.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/012-720.webm
258.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/020-720.webm
258.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.3 - Ciphers and Ciphers Modes/001-720.webm
258.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand.webm
258.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/011-720.webm
257.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.1.mp4
257.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/029-720.webm
257.8 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/2. Case Studies/47. Maturity Model Example.mp4
257.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/010-720.webm
257.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/010-720.webm
257.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.3 - Alternative Web Interfaces/001-720.webm
257.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/9. Course Roadmap 2.mp4
257.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/020-720.webm
257.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/001-720.webm
257.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/012-720.webm
256.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/002-720.webm
256.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/14.mp4
256.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/006-720.webm
256.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/025-720.webm
256.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/034-720.webm
256.2 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/1. ThirdParty Application Analysis.mp4
255.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.32.mp4
255.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/029-720.webm
255.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/034-720.webm
255.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.5.mp4
254.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/2. Todays Activities.mp4
253.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/3. Microservice Security/3. Monolith Architecture Security Controls.mp4
253.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/017-720.webm
253.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.1.mp4
252.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/009-720_Using_Debuggers_for_Dumping.webm
252.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/013-720.webm
251.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/001-720.webm
251.8 kB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/018-720.webm
251.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/012-720.webm
251.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/33. Cloud Formation Resources.mp4
251.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/022-720.webm
251.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/10.webm
251.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/6. Legal compliance and privacy/10.mp4
251.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.1.mp4
250.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/019-720.webm
250.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/012-720.webm
250.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_3.webm
250.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/025-720.webm
249.6 kB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/012-720.webm
249.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/033_526/002-720.webm
249.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.1.mp4
249.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/001-720.webm
248.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/001-720.webm
248.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/004-720.webm
248.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/001-720.webm
248.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/011-720.webm
248.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/013-720.webm
247.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/022-720.webm
247.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/14.mp4
247.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/001-720.webm
246.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/028-720.webm
246.0 kB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/001-720.webm
245.6 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/1. Introduction and Planning of Red Team Exercises/12. Social Engineering/6.mp4
245.6 kB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/002-720.webm
245.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/007-720_Debugging_Packed_Malware.webm
245.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/007-720.webm
245.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/28.mp4
244.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/016-720.webm
244.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/001-720.webm
244.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/15.webm
244.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/40.mp4
244.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/13.webm
244.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/016-720.webm
243.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/015-720.webm
243.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/016-720.webm
243.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/14.mp4
242.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/3. Software Security Testing/2.mp4
242.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.16.mp4
242.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/2. Secure Infrastructure as Code/26. Course Roadmap 3.mp4
242.2 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/3. Collecting User Information/3.mp4
242.1 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/063-720.webm
241.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/056-720.webm
241.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/3. Preventive Measures/2.mp4
241.5 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/49.mp4
241.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/022-720.webm
241.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/023-720.webm
240.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/012-720.webm
240.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/008-720.webm
240.1 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/1. Initial Access/12.mp4
239.5 kB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/012-720.webm
239.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/37.mp4
238.9 kB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/023-720.webm
238.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/3. Continuous Delivery/5. Course Roadmap 2.mp4
238.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/9. NationState Case.mp4
237.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/008-720.webm
236.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/010-720.webm
236.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/4.mp4
236.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/33.webm
235.9 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/11. Course Roadmap 2.mp4
235.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/010-720_Using_Debuggers_for_Dumping.webm
235.2 kB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/014-720.webm
234.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand.webm
234.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/12.webm
234.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/038-720.webm
233.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/009-720_Debugging_Packed_Malware.webm
232.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.2 TESTING SOFTWARE CONFIGURATION/SEC542- SANS OnDemand_2_2.webm
231.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/21.webm
231.3 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/7.mp4
230.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/021-720.webm
230.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/021-720.webm
229.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.16.mp4
229.6 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/067-720.webm
228.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/006-720.webm
228.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/006-720.webm
227.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.10 API ATTACKS/SEC542- SANS OnDemand_2.webm
227.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/051-720.webm
226.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/18.mp4
226.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/49.mp4
226.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/1. Identification and Authentication/18.mp4
225.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/014-720.webm
225.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.1 Introduction Linux Security Essentials/1.webm
225.1 kB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/003-720.webm
224.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.1 - Introduction to Web Cryptography/001-720.webm
224.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/011-720_Debugging_Packed_Malware.webm
223.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/021-720.webm
222.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/35.mp4
222.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/033-720_Analyzing_Multi-Technology_Malware.webm
222.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/2. Technical Security Testing/17.mp4
221.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/013-720.webm
221.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/013-720.webm
220.5 kB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/002-720.webm
220.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/21.webm
220.2 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/8. Lateral Movement and Pivoting/10.mp4
219.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/16.webm
219.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/1. Classify Information and Supporting Assets/3.mp4
218.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/32.webm
217.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/13.webm
217.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/026-720.webm
217.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.4 SPIDERING WEB APPLICATIONS/SEC542- SANS OnDemand_16.webm
217.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/049-720.webm
217.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/56.mp4
216.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/017-720.webm
216.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/10.webm
215.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/2. Develop Policy/68. Development Examples 2.mp4
215.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/020-720.webm
215.5 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/001-720.webm
215.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_14.webm
215.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/41.webm
214.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/23. Financial Information Case.mp4
214.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/030-720.webm
214.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/015-720.webm
213.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/024-720.webm
213.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/024-720.webm
213.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/006-720.webm
212.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/46.mp4
211.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/023-720.webm
211.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/4. Secure Continuous Delivery/17. Git Workflow Share Change with Another Remote.mp4
211.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/009-720.webm
211.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/23.webm
210.5 kB
SEC564 - Red Team Exercises and Adversary Emulation/video/2020/2. Red Team Exercise Execution and Closure/14. Remediation and Action Plan/11.mp4
210.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/008-720.webm
210.0 kB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.2 EXCEPTION HANDLING/01.webm
209.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/30.mp4
209.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/018-720.webm
208.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/32.webm
207.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/39.mp4
207.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/041_526/002-720.webm
207.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/009-720.webm
207.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/013-720.webm
206.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/029-720.webm
206.3 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/029-720.webm
206.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/010-720.webm
206.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/006-720_Debugging_Packed_Malware.webm
205.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/008-720_Using_Debuggers_for_Dumping.webm
205.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/025-720.webm
204.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/14.webm
204.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand.webm
203.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/53.mp4
203.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.4 WEB APPLICATION PEN TESTER'S TOOLKIT/SEC542- SANS OnDemand_5.webm
203.6 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/9.mp4
203.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/015-720.webm
203.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/050-720.webm
203.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/014-720.webm
203.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/022-720.webm
203.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_6.webm
202.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/36. Big Changes Big Risks Small Changes Small Risks.mp4
202.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/010-720_Analyzing_Multi-Technology_Malware.webm
202.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/023-720.webm
202.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/040-720.webm
202.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.15.mp4
200.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/25.webm
200.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/8.mp4
200.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/011-720.webm
200.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/018-720.webm
200.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand_17.webm
199.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/039-720.webm
199.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.6 OSINT/SEC542- SANS OnDemand_27.webm
199.5 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/8.mp4
198.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/014-720.webm
197.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/022_526/005-720.webm
197.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.14.mp4
196.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/010-720.webm
196.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/30. Lab 21 Group the Big Ideas.mp4
195.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/019-720.webm
195.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.9 HTTPS AND TESTING FOR WEAK CIPHERS/SEC542- SANS OnDemand_10_2.webm
195.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/014-720.webm
195.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/013-720.webm
195.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/013-720.webm
195.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/017-720 (1).webm
195.4 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/4. Writing Your Own Functions and Scripts/10.mp4
195.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.49.mp4
194.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/018-720.webm
194.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/011-720.webm
193.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/16.mp4
193.7 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/2. Locked iOS Backup Files/6. Elcomsoft Attacks 2.mp4
193.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/001-720.webm
193.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/001-720.webm
193.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_014/020-720.webm
193.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_5_3.webm
193.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/020-720.webm
192.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/005-720 (1).webm
192.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/009-720.webm
192.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.4 - Mobile Applications/010-720.webm
192.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_11.webm
191.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/007-720 (1).webm
191.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.10 INTERCEPTION PROXIES/SEC542- SANS OnDemand_5.webm
191.5 kB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/27.webm
191.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/33.webm
191.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/31.webm
191.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/1/5.mp4
191.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/016-720.webm
191.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.3 COURSE LOGISTICS/SEC542- SANS OnDemand.webm
191.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/020-720.webm
190.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/004-720 (1).webm
189.9 kB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/018-720.webm
189.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/048-720.webm
189.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/017-720.webm
189.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/012-720.webm
189.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.12 HEART BLEED/SEC542- SANS OnDemand_7_2.webm
188.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_9.webm
188.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/019-720.webm
188.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/049-720.webm
188.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/013-720.webm
188.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.3-Bypass Flaws/SEC542- SANS OnDemand_1.webm
188.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.3-Bypass Flaws/SEC542- SANS OnDemand_4.webm
188.5 kB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/016-720.webm
188.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/018-720.webm
188.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand.webm
188.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/009-720.webm
188.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/048-720.webm
187.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.12 HEART BLEED/SEC542- SANS OnDemand_5.webm
187.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/008-720_Debugging_Packed_Malware.webm
186.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.5 WHOIS AND DNS/SEC542- SANS OnDemand.webm
186.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/9. Burp Suite Proxy Options.mp4
186.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/011-720.webm
186.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_17.webm
186.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.10 INTERCEPTION PROXIES/SEC542- SANS OnDemand_6.webm
186.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/015-720.webm
186.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_11_2.webm
186.2 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/5. Certificates and Multifactor Authentication/4. Smart Token Multifactor Authentication/6.mp4
186.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_15.webm
185.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/047-720.webm
185.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/016-720.webm
185.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/006-720_Using_Debuggers_for_Dumping.webm
185.3 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/7. Advanced Acquisition/2.mp4
185.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand.webm
185.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_044_Debugging_Packed_Malware/010-720_Debugging_Packed_Malware.webm
185.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/035-720.webm
184.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/006-720 (1).webm
184.7 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/009-720.webm
184.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/036-720.webm
184.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/020-720.webm
184.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.13.mp4
183.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/8. Cryptography/44.mp4
183.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/008-720 (1).webm
183.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/30.webm
183.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/011-720 (1).webm
182.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/041-720_Analyzing_Multi-Technology_Malware.webm
182.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/012-720.webm
182.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.10 BURP INTRUDER/SEC542- SANS OnDemand_7_2.webm
182.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/012-720_Getting_Started_with_Unpacking.webm
182.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/028-720.webm
182.2 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/061-720.webm
181.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/010-720.webm
181.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.14.mp4
181.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.4-Vunerable Web Apps-Mutillidae/SEC542- SANS OnDemand_1.webm
181.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/002_526_OnDemand/004-720.webm
180.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/049-720.webm
180.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/013-720.webm
180.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/035-720.webm
180.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_5.webm
180.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/017-720.webm
180.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/020-720_Malware_Memory_Forensics.webm
180.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/32. Summary.mp4
180.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.1 Introduction Cryptography and Risk Management/1.webm
180.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.5-Command Injection/SEC542- SANS OnDemand_6.webm
179.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/023-720.webm
179.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/22.webm
179.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/012-720.webm
179.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/012-720 (1).webm
179.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/026-720.webm
179.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/002_526_OnDemand/002-720.webm
179.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/014-720.webm
179.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.4 WPScan/SEC542- SANS OnDemand_3.webm
179.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/037-720_Analyzing_Multi-Technology_Malware.webm
179.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/028-720.webm
179.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/032-720.webm
178.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/024-720.webm
178.7 kB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/019-720.webm
178.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/024-720_Code_Injection_API_Hooking.webm
178.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/043-720_Analyzing_Multi-Technology_Malware.webm
178.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/042-720.webm
178.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.3 CROSS-SITE SCRIPTING (XSS) PRIMER/SEC542- SANS OnDemand_3.webm
178.1 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/18.mp4
178.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/006-720.webm
178.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/048-720.webm
177.7 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/078-720.webm
177.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/61.webm
177.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_11.webm
177.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/010-720.webm
177.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/3.webm
177.6 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/34.mp4
177.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/036-720.webm
177.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_8.webm
176.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/005-720_Using_Debuggers_for_Dumping.webm
176.8 kB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/013-720.webm
176.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/002_526_OnDemand/006-720.webm
176.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.9 AJAX/SEC542- SANS OnDemand_6.webm
176.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/038-720.webm
175.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/012-720.webm
175.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/005-720.webm
175.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.4 WPScan/SEC542- SANS OnDemand_4_2.webm
175.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/20.mp4
175.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_23.webm
175.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/029-720.webm
174.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/33.webm
174.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/018-720.webm
174.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_17.webm
173.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/036-720_Analyzing_Multi-Technology_Malware.webm
173.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_18.webm
173.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/026-720.webm
173.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/009-720.webm
173.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/012-720_Analyzing_Multi-Technology_Malware.webm
173.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/015-720.webm
172.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.7-SQLI Injection Primer/SEC542- SANS OnDemand.webm
172.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/030-720.webm
172.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/031-720.webm
172.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand_8.webm
172.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/31.mp4
172.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/032-720_Analyzing_Multi-Technology_Malware.webm
172.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/021-720.webm
172.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/006-720.webm
172.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/015-720.webm
172.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/015-720.webm
171.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/010-720.webm
171.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/010-720.webm
171.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/037-720.webm
171.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/007-720.webm
171.4 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_3.webm
171.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/016-720 (1).webm
171.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/040-720_Analyzing_Multi-Technology_Malware.webm
171.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/015-720.webm
171.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/3.mp4
171.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/027-720.webm
171.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.6 METASPLOIT/SEC542- SANS OnDemand_15_2.webm
170.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_4.webm
170.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_1.webm
170.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/60.mp4
170.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/012-720 (1).webm
169.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/028-720.webm
169.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.5 BURP SCANNER/SEC542- SANS OnDemand.webm
169.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand.webm
169.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/044-720.webm
169.4 kB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/1. Android Acquisition Considerations/2. SANS DFIR.mp4
169.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/23.webm
169.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/004-720_Analyzing_Multi-Technology_Malware.webm
169.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.10.mp4
169.2 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.8 SUMMARY/SEC542- SANS OnDemand_3_2.webm
169.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.8 SUMMARY/SEC542- SANS OnDemand_5_2.webm
169.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/052-720.webm
169.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/2. Facebook Analysis/1.mp4
168.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/8. Effective Habits and Process/1.mp4
168.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/030-720_Analyzing_Multi-Technology_Malware.webm
168.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.13.mp4
168.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.9-Exploiting SQli/SEC542- SANS OnDemand.webm
168.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/010-720.webm
168.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_18.webm
168.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_026/005-720.webm
168.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand_9_2.webm
168.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_16.webm
168.1 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/2. SANS DFIR.mp4
167.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/27.mp4
167.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.28.mp4
167.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/015-720 (1).webm
167.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/017-720.webm
167.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/051-720.webm
166.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/014-720.webm
166.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/004-720.webm
166.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/4. OSINT Frameworks/1.mp4
166.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/010-720 (1).webm
166.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/033-720.webm
166.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_23.webm
166.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/008-720.webm
166.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.1 XXE/SEC542- SANS OnDemand_3_2.webm
166.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/025-720.webm
166.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 2/1.1 SCANNING THE NMAP/SEC542- SANS OnDemand_2.webm
166.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/013-720.webm
166.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/007-720_Using_Debuggers_for_Dumping.webm
166.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.6 XSS IMPACTS/SEC542- SANS OnDemand.webm
166.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_1.webm
166.0 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/008-720.webm
165.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/010-720_Getting_Started_with_Unpacking.webm
165.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.5 DISCOVERING XSS/SEC542- SANS OnDemand_3.webm
165.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/10. Creating Sock Puppets/1.mp4
165.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/007-720.webm
165.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/015-720.webm
165.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/5. Twitter Data/1.mp4
165.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/1.mp4
165.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.8 SUMMARY/SEC542- SANS OnDemand_7_2.webm
165.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/1. People Search Engines/3.mp4
165.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/008-720.webm
165.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/033-720.webm
165.2 kB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/002-720.webm
165.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/2. Understanding OSINT/1.mp4
164.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/027-720.webm
164.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.1-Injection/SEC542- SANS OnDemand_2.1.webm
164.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/012-720.webm
164.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/027-720_Analyzing_Multi-Technology_Malware.webm
164.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/016-720.webm
164.3 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.7 XSS TOOLS/SEC542- SANS OnDemand_3.webm
164.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.12.mp4
164.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/027-720.webm
164.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/2. Software Environment and Security Controls/1.mp4
164.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.48.mp4
163.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/1. Course Roadmap.mp4
163.8 kB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/013-720.webm
163.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/002_526_OnDemand/003-720.webm
163.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/19.webm
163.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/006-720.webm
163.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/022-720.webm
162.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/1. Course Roadmap.mp4
162.9 kB
SEC503 - Network Intrusion Detection/video/2018/4.1 Intro Network monitoring - snort and bro/002-720.webm
162.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.15.mp4
162.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/018-720.webm
162.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/8. Where to go from here/1. Course Roadmap.mp4
162.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.8 Pivoting/SEC560 - 4.8.15.mp4
162.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.14.mp4
161.9 kB
SEC503 - Network Intrusion Detection/video/2018/0.2 Lab Intro/005-720.webm
161.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/1. Static Application Analysis/3. Course Roadmap.mp4
161.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/28. Course Roadmap 2.mp4
161.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/27. Course Roadmap 2.mp4
161.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/044-720.webm
161.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/023-720_Code_Injection_API_Hooking.webm
161.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_026/004-720.webm
161.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/027-720_Code_Injection_API_Hooking.webm
160.9 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.10 API ATTACKS/SEC542- SANS OnDemand.webm
160.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/029-720.webm
160.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_9.webm
160.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/030-720.webm
160.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/32. Course Roadmap 3.mp4
160.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/30. Course Roadmap 2.mp4
160.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/001-720.webm
160.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/1. Course Roadmap 1.mp4
160.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/15. Course Roadmap 2.mp4
160.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/017-720_Malware_Memory_Forensics.webm
160.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/046-720.webm
160.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/23. Course Roadmap 2.mp4
160.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand_11_2.webm
160.0 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 4/4.8 BeEF/SEC542- SANS OnDemand.webm
160.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/1. Course Roadmap 1.mp4
159.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/031-720.webm
159.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.16.mp4
159.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.8.mp4
159.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/4. Diving into the Collecting/1.mp4
159.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/24. ooVoo Report Card.mp4
159.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/1. Course Roadmap 1.mp4
159.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/3. Freenet/1.mp4
158.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.15.mp4
158.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/1. Course Roadmap.mp4
158.7 kB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/016-720.webm
158.4 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/008-720.webm
158.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/044-720.webm
158.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/007-720.webm
158.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/5. Data Storage on iOS/35. Course Roadmap 2.mp4
158.0 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/2. Security Evaluation Models/1.mp4
158.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/020-720.webm
157.6 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/3. Security Capabilities/1.mp4
157.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/026-720.webm
156.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/046-720.webm
156.8 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/6.mp4
156.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.12.mp4
156.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/031-720.webm
156.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/5. Thin Clients and Mobile Systems/1.mp4
156.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/034-720.webm
156.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/7. Setting up an OSINT Platform/1.mp4
156.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/011-720.webm
156.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/014-720.webm
156.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/025-720_Code_Injection_API_Hooking.webm
155.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.1.mp4
155.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/013-720.webm
155.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/50.webm
155.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.50.mp4
155.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.12.mp4
155.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/12.webm
155.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.3 BloodHound/SEC560 - 5.3.5.mp4
155.6 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/038-720.webm
155.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.51.mp4
155.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/11.webm
155.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/047-720.webm
155.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/005-720.webm
155.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/6. Internet of Things and SCADA/1.mp4
155.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.10 Hashcat/SEC560 - 4.10.11.mp4
154.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/7. Distributed Systems/1.mp4
154.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/023-720.webm
154.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/4. Databases Applets and Web Vulnerabilities/1.mp4
154.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.18.mp4
154.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/013-720.webm
154.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/018-720.webm
153.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/043-720.webm
153.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/010-720_Code_Injection_API_Hooking.webm
153.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/1.mp4
153.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/007-720.webm
153.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.23.mp4
153.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/031-720.webm
152.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/1. Classify Information and Supporting Assets/1.mp4
152.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.39.mp4
152.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/10. Physical Security/1.mp4
152.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/045-720.webm
152.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/046-720.webm
152.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/018-720.webm
152.0 kB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/035-720.webm
152.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.12 Pass-the-Hash Attacks/SEC560 - 4.12.11.mp4
151.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.11.mp4
151.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.13.mp4
151.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_031/014-720.webm
151.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_032/014-720.webm
151.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/015-720.webm
151.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/015-720.webm
151.1 kB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/25.webm
151.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/005-720.webm
150.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/8. Security policies procedures and other key documents/1.mp4
150.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/025-720_Analyzing_Multi-Technology_Malware.webm
150.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/014-720.webm
150.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.10.mp4
150.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/7. International Issues/1.mp4
150.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/004-720.webm
150.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/1. Course Roadmap.mp4
150.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/018-720.webm
150.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/040-720.webm
150.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/1. Course Roadmap.mp4
150.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/7. User Names/1.mp4
149.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/011-720_Code_Injection_API_Hooking.webm
149.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/029-720.webm
149.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.12.mp4
149.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.3 BloodHound/SEC560 - 5.3.1.mp4
149.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/2/9.mp4
149.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/009-720_Code_Injection_API_Hooking.webm
149.5 kB
SEC573 - Automating Information Security with Python/video/2020/Section 2/2.4 DICTIONARIES/18.webm
149.4 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/009-720.webm
149.1 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/3. File Metadata Analysis/1.mp4
148.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/029-720.webm
148.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/1. Data Analysis Challenges/3.mp4
148.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/022-720.webm
148.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/5. Building Your Lab/16. Course Roadmap 3.mp4
148.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/025-720.webm
148.2 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/6. Basic Data Email Addresses/1.mp4
148.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.14.mp4
148.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/014-720.webm
147.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/016-720.webm
147.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.8.mp4
147.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/016-720.webm
147.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/1. Course Roadmap.mp4
147.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/2. Harvesting Web Data/1.mp4
147.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/018-720.webm
146.9 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/2. Gathering Searching and Analyzing OSINT/9. Additional Public Data/1.mp4
146.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/023-720.webm
146.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/014-720_Code_Injection_API_Hooking.webm
146.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/2. IP Address/1.mp4
146.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/5. Wireless Networks/1.mp4
146.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/7. Government Data/1.mp4
146.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/009-720 (1).webm
146.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/019-720.webm
146.2 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/9. MDM and MAM.mp4
146.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/004-720_Using_Debuggers_for_Dumping.webm
146.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/022-720.webm
146.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/9. Management Curriculum.mp4
145.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/30. Course Roadmap 2.mp4
145.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/3. What You Need to Know iOS/18. Course Roadmap 2.mp4
145.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/3. DNS/1.mp4
145.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/010-720.webm
145.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/009-720.webm
145.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/009-720.webm
145.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/023-720.webm
145.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.45.mp4
145.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.13.mp4
145.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/018-720 (1).webm
145.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.9.mp4
145.2 kB
SEC573 - Automating Information Security with Python/video/2020/Section 5/5.6 PYTHON OBJECTS AND OBJECT-PROGRAMMING/26.webm
145.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.10.mp4
144.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/1. Course Roadmap.mp4
144.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/013-720.webm
144.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/034-720_Analyzing_Multi-Technology_Malware.webm
144.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/015-720.webm
144.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/5. Mobile Application Runtime Manipulation/1. Course Roadmap.mp4
143.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/2. Android Dynamic Anaysis with Drozer/10. Course Roadmap 2.mp4
143.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/21.webm
143.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/019-720.webm
143.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/019-720 (1).webm
143.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/016-720.webm
143.6 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/1. Whois/3.mp4
143.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/008-720_Code_Injection_API_Hooking.webm
143.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/022-720.webm
143.4 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/1. Overview/2.mp4
143.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/015-720.webm
143.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.13.mp4
143.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/1. Course Roadmap.mp4
142.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/020-720.webm
142.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/006-720.webm
142.6 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/013-720.webm
142.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.12.mp4
142.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/013-720_Code_Injection_API_Hooking.webm
142.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/019-720.webm
142.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/017-720.webm
142.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/021-720.webm
142.1 kB
SEC503 - Network Intrusion Detection/video/2018/0.2 Lab Intro/002-720.webm
142.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/013-720.webm
142.0 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/018-720.webm
142.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/022-720.webm
142.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/1/4.mp4
141.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/014-720.webm
141.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/011-720_Using_Debuggers_for_Dumping.webm
141.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.11.mp4
141.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/031-720.webm
141.3 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/40.mp4
141.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/016-720.webm
140.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/017-720.webm
140.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/25.webm
140.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.14.mp4
140.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/020-720.webm
140.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/1. Course Roadmap.mp4
140.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/014-720 (1).webm
140.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/022-720.webm
140.4 kB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/002-720.webm
140.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/012-720.webm
140.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/022-720.webm
140.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/017-720.webm
140.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/4. Modifying Mobile Applications/19. Course Roadmap 2.mp4
139.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/4. Findings Online Devices/1.mp4
139.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/017-720.webm
139.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/003-720.webm
139.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/6. Automated Runtime Manipulation with Objection/12. Course Roadmap 2.mp4
139.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/012-720.webm
139.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/011-720.webm
139.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/5. Incident Response/1.mp4
139.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/2/7.mp4
139.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.7 ZAP Proxy/SEC560 - 5.7.13.mp4
139.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/5. Summary/9. Building LongTerm Gains Checklist.mp4
139.0 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/27.mp4
139.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/013-720_Using_Debuggers_for_Dumping.webm
139.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/019-720.webm
138.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/037-720.webm
138.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/3. Cloud Security Monitoring/30. Lab 53 Cloud Custodian Remediation.mp4
138.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.26.mp4
138.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/023-720.webm
138.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/025-720.webm
137.9 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/002-720.webm
137.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/012-720_Using_Debuggers_for_Dumping.webm
137.7 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/22.mp4
137.6 kB
SEC503 - Network Intrusion Detection/video/2018/1.1 Intro Fundamental of traffic analysis I/002-720.webm
137.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.2 Responder/SEC560 - 5.2.15.mp4
137.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/038-720_Analyzing_Multi-Technology_Malware.webm
136.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/2. Mobile Problems and Opportunities/19. Conclusion.mp4
136.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/3.webm
136.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/3. Secure Network Components/30.mp4
136.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/036-720.webm
136.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/25.webm
136.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.15.mp4
136.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/5. Summary/7. Quick Wins Checklist 1.mp4
136.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/050-720.webm
136.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/023-720.webm
136.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_053/030-720.webm
136.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/032-720.webm
135.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/019-720.webm
135.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_051/036-720.webm
135.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/047-720.webm
135.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/6. Investigations and eDiscovery/1.mp4
135.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/014-720.webm
135.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.18.mp4
135.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.12.mp4
135.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/053-720.webm
135.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/027-720.webm
134.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/018-720.webm
134.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/019-720.webm
134.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/023-720.webm
134.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/2. Change Patch and Vulnerability Management/1.mp4
134.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/7. Resiliency Disaster Recovery and Business Continuity/1.mp4
133.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/5. SSLTLS attacks/17. Module Summary.mp4
133.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/038-720.webm
133.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/029-720.webm
133.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/9. Putting It All Together/1.mp4
133.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.11.mp4
133.2 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/41.mp4
133.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/2/8.mp4
133.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/029-720.webm
132.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/021-720.webm
132.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/011_526/002-720.webm
132.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/019-720.webm
132.7 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/19.mp4
132.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/027-720.webm
132.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/018-720.webm
132.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/031-720.webm
132.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/6. Network Authentication/1.mp4
132.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/021-720.webm
132.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.17.mp4
132.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.11.mp4
131.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/023-720.webm
131.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/020-720.webm
131.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.16.mp4
131.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/1.mp4
131.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/025-720.webm
131.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/045-720.webm
131.3 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/4. Memory and Triage Acquisition/18.mp4
131.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.8.mp4
131.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.13.mp4
130.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/012-720.webm
130.5 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/040-720.webm
130.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/32.webm
130.3 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/8. Vehicle Searches/1.mp4
130.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/009-720.webm
130.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/027-720.webm
130.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/021-720.webm
129.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/041-720.webm
129.6 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/34.mp4
129.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/023-720.webm
129.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.27.mp4
129.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_055/017-720.webm
129.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/004-720.webm
129.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/021-720.webm
128.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/002_526_OnDemand/005-720.webm
128.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/003-720.webm
128.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.21.mp4
128.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/016-720.webm
128.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/006-720.webm
128.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.9.mp4
128.1 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/42.mp4
128.1 kB
FOR500 - Windows Forensic Analysis/video/2018/7. Windows Forensic Challenge/1. The Forensic Challenge HandsOn Case Study/4.mp4
128.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/019-720.webm
127.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/8.mp4
127.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/002-720.webm
127.6 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/38.mp4
127.6 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/1. Core Windows Forensics II USB Devices and Shell Items Introduction/3.mp4
127.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/011-720.webm
127.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/033-720.webm
127.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/1. The Stolen Device Threat and Mobile Malware.mp4
127.2 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/099-720.webm
127.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.24.mp4
127.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/025-720.webm
127.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/13.mp4
127.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/001_526_OnDemand/004-720.webm
126.9 kB
SEC503 - Network Intrusion Detection/video/2018/0.1 Course Intro/004-720.webm
126.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/022-720.webm
126.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/11.mp4
126.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.33.mp4
126.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.13.mp4
126.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/5. Summary/8. Quick Wins Checklist 2.mp4
126.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.8 Injection Attacks Overview - Command Injection/SEC560 - 5.8.14.mp4
126.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.38.mp4
126.5 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/015-720.webm
126.5 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.2-Session Token Gathering & Session Fixation/SEC542- SANS OnDemand_5.webm
126.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/011_526/004-720.webm
126.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/020-720.webm
126.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/001-720.webm
126.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/004-720.webm
126.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/2. Biometrics and Single SignOn/1.mp4
126.1 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/21.mp4
125.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/020-720.webm
125.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/014-720.webm
125.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/46.webm
125.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/010-720.webm
125.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/001-720.webm
125.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/014_526/019-720.webm
125.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/015_526/001-720.webm
125.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/014-720.webm
125.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/028-720.webm
125.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/013-720.webm
125.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/001-720.webm
125.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.3 Reconnaissance/SEC560 - 1.3.14.mp4
125.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/103-720.webm
125.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/050-720.webm
125.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/024-720.webm
125.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/021-720.webm
125.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/009-720.webm
125.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/009-720 (1).webm
125.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.9.mp4
125.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/2. Storage Voice and Wireless Protocols/12.mp4
125.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/027-720.webm
124.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/023-720.webm
124.8 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/2. Brief Intro to 508/2.mp4
124.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/67. Strategic Planning Tools Section 2.mp4
124.7 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/17.mp4
124.7 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/5. Resources 2 Leadership.mp4
124.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/024-720.webm
124.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.2 Pen Test Planning/SEC560 - 1.2.104.mp4
124.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.14.mp4
124.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/023-720.webm
124.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/027-720.webm
124.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/2.mp4
124.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/11.mp4
124.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/2.mp4
124.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.3 Motivation and Definitions/SEC560 - 4.3.1.mp4
123.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/001_526_OnDemand/007-720.webm
123.8 kB
SEC503 - Network Intrusion Detection/video/2018/0.1 Course Intro/007-720.webm
123.8 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/045-720.webm
123.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.12.mp4
123.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/1/5.mp4
123.6 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/14.mp4
123.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/4. Implement and Manage Authorization Mechanisms/1.mp4
123.4 kB
SEC503 - Network Intrusion Detection/video/2018/2.1 Intro Fundamental of traffic analysis II/002-720.webm
123.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.37.mp4
123.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/016-720.webm
123.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/016-720 (1).webm
123.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/17.mp4
123.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/3. Federated and Cloud Identity/1.mp4
123.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/15.mp4
122.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/2/4.mp4
122.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/022-720.webm
122.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/4. Obfuscated Apps/26. Summary.mp4
122.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.11.mp4
122.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.8.mp4
122.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/017-720.webm
122.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/026-720.webm
122.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.14.mp4
122.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/5.mp4
122.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.32.mp4
122.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.7 Port Pivot Relay/SEC560 - 3.7.9.mp4
122.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/011-720_Analyzing_Multi-Technology_Malware.webm
122.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/9.mp4
121.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/014-720.webm
121.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/014-720.webm
121.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/001-720.webm
121.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/18.mp4
121.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.4 Windows Privilege Escalation and UAC/SEC560 - 5.4.15.mp4
121.6 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/3. Deliver the Program/66. Strategic Planning Process.mp4
121.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/3. Network Manipulation Attacks/23. Module Summary.mp4
121.2 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/1. Core Windows Forensics IVInternet Browers Introduction/2.mp4
121.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_026/003-720.webm
121.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/024-720.webm
121.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/14. Form Your Teams.mp4
121.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/2. Manual Static Analysis/22. Module Summary.mp4
121.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/021-720.webm
120.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/021-720.webm
120.9 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/30.mp4
120.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/34. Module Summary.mp4
120.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.1 Kerberos/SEC560 - 5.1.25.mp4
120.6 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/2. ThirdParty Application Artifacts/13. FileSharing Artifacts.mp4
120.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.8.mp4
120.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/016-720.webm
120.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/024-720_Analyzing_Multi-Technology_Malware.webm
120.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/005-720_Analyzing_Multi-Technology_Malware.webm
120.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/29. MODULE Summary.mp4
119.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/34.webm
119.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/009-720.webm
119.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/001-720.webm
119.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/034_526/018-720.webm
119.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/014-720.webm
119.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/026-720.webm
119.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/026-720.webm
119.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/022-720.webm
119.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/013-720.webm
119.3 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/32.mp4
119.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/016-720.webm
119.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/6.mp4
119.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_11.webm
119.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/40. Managing Secrets Summary.mp4
119.1 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/19.mp4
119.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/029-720.webm
119.0 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/20.mp4
119.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/30. Module Summary.mp4
118.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/24.webm
118.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/014-720_Using_Debuggers_for_Dumping.webm
118.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/017-720.webm
118.7 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/40.mp4
118.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/2/5.mp4
118.6 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/2. Brief Intro to 508/1.mp4
118.6 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/18.mp4
118.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/7. Resources 4 Leadership and Change.mp4
118.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_038/003-720.webm
118.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/013-720.webm
118.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.39.mp4
117.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/018-720.webm
117.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/001-720.webm
117.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/6. Intercepting SSLTLS traffic/27. Module Summary.mp4
117.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/026-720.webm
117.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/029-720.webm
117.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/040-720.webm
117.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/052_526/030-720.webm
117.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/013-720.webm
117.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/013-720 (1).webm
117.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/5.mp4
117.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/33.webm
117.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/053-720.webm
117.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/020-720.webm
116.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/4. Resources 1 Strategy.mp4
116.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/022-720.webm
116.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/011-720.webm
116.5 kB
FOR500 - Windows Forensic Analysis/video/2018/7. Windows Forensic Challenge/1. The Forensic Challenge HandsOn Case Study/2.mp4
116.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/013-720 (1).webm
116.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/020-720.webm
116.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/016-720.webm
116.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.2 - Basic Crypto Concepts/017-720.webm
116.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.3 Metasploit/SEC560 - 3.3.21.mp4
115.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/8. Resources 5 Communications.mp4
115.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/018-720.webm
115.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_038/005-720.webm
115.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/31. Breaking Changes in Android 1.mp4
115.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/009-720.webm
115.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/011-720_Getting_Started_with_Unpacking.webm
115.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/13.webm
115.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/2/2.mp4
115.2 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/48.mp4
115.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/029-720.webm
115.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/76. Strategic Planning Tools Section 1.mp4
115.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/017-720.webm
115.0 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/37.mp4
114.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/009-720_Analyzing_Multi-Technology_Malware.webm
114.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/1. Capture the Flag.mp4
114.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/019-720.webm
114.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/028-720.webm
114.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/015-720.webm
114.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/3. SANS DevSecOps Curriculum.mp4
114.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/7.mp4
114.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.13.mp4
114.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/9.mp4
114.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/7. Leveraging Mobile Malware/27. Summary.mp4
114.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/018-720.webm
114.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/6.mp4
114.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/053_526/046-720.webm
114.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.15.mp4
114.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/029-720.webm
114.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.4 Monitoring and Attack Detection/29.webm
113.9 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/4. Internet Explorer Overview/14.mp4
113.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.8.mp4
113.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/4.mp4
113.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/007-720_Analyzing_Multi-Technology_Malware.webm
113.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.7 Obtaining Hashes and Dumping/SEC560 - 4.7.1.mp4
113.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/10.mp4
113.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/2. Strategic Roadmap Development/1. Define Current State/49. Lab 22 SWOT Exercise 2.mp4
113.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/020-720.webm
113.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/036-720.webm
113.3 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/3. Security Policy Development Assessment/4. Assess Policy and Procedure/36. Strategic Planning Process.mp4
113.3 kB
SEC573 - Automating Information Security with Python/video/2020/Section 6/6.1 CAPSTONE WORKSHOP/17.webm
113.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/028-720.webm
113.0 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/042-720.webm
113.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/019-720.webm
112.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.1 - Web Application Security Defenses/014-720.webm
112.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.20.mp4
112.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/008-720.webm
112.5 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/75. Strategic Planning Process.mp4
112.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/8.mp4
112.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/29.mp4
112.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/001_526_OnDemand/003-720.webm
112.4 kB
SEC503 - Network Intrusion Detection/video/2018/0.1 Course Intro/003-720.webm
112.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/38.webm
112.3 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/007-720.webm
112.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.5 Domain Dominance Attacks/SEC560 - 5.5.20.mp4
112.1 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/31.mp4
112.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.7 Port Pivot Relay/SEC560 - 3.7.4.mp4
112.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.1.mp4
112.0 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/4. Network Traffic Manipulation/12. Module Summary.mp4
111.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/001-720.webm
111.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.6 Netcat for the Pen Tester/SEC560 - 2.6.10.mp4
111.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/001-720.webm
111.8 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/41. Summary.mp4
111.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/21.mp4
111.7 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/14.mp4
111.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/031-720.webm
111.6 kB
SEC573 - Automating Information Security with Python/video/2020/Section 1/1.8 MODULES/11.webm
111.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/1. Cloud Security Fundamentals/3. Course Roadmap 1.mp4
111.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/024-720.webm
111.3 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/2. Introduction to Lab Exercises/4.mp4
111.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/042_526/025-720.webm
111.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/016-720.webm
111.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/009-720.webm
111.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/10. DevOps Security Tools.mp4
111.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/043_526/018-720.webm
111.0 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/20.mp4
110.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/027-720.webm
110.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.1 Why Exploitation/SEC560 - 3.1.4.mp4
110.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/063-720.webm
110.6 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.23.mp4
110.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.2 Sniffing with tcpdump/SEC560 - 2.2.1.mp4
110.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.5 AV Evasion with Veil/SEC560 - 3.5.8.mp4
110.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/44. Course Roadmap 3.mp4
110.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.29.mp4
110.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/3.mp4
110.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/6. Resources 3 Leadership and Management.mp4
110.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/014-720.webm
110.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/1. Introduction to DevSecOps/2. Introduction to Cloud and DevOps/13. Course Roadmap 2.mp4
110.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.4 OS Fingerprinting and Version Scanning/SEC560 - 2.4.6.mp4
110.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.3 Port Scanning/SEC560 - 2.3.35.mp4
109.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/016-720.webm
109.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/021-720.webm
109.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/019-720.webm
109.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.11.mp4
109.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/016-720.webm
109.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.29.mp4
109.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/42. Course Roadmap 4.mp4
109.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/016-720.webm
109.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.3 Hardening and Securing Linux Services/3.webm
109.4 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/41.mp4
109.4 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/4.mp4
109.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/4.mp4
109.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/1/4.mp4
109.1 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/25.mp4
109.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/8.mp4
109.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/014-720.webm
109.0 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/29. Course Roadmap 2.mp4
108.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/3. Teams.mp4
108.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/9. Infrastructure as Code.mp4
108.8 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/28.mp4
108.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.5 - Figerprint Defenses/020-720.webm
108.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.9 Windows Command Line/SEC560 - 3.9.34.mp4
108.4 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/2. Network Activity Analysis/15. Module Summary.mp4
108.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/016-720.webm
108.2 kB
SEC503 - Network Intrusion Detection/video/2018/0.2 Lab Intro/007-720.webm
108.2 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/1.mp4
108.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/2. Course Roadmap.mp4
108.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/045-720.webm
107.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/014-720.webm
107.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/014-720 (1).webm
107.8 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/1. Course Roadmap 1.mp4
107.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/26.webm
107.7 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/4. Examining System Configuration/17.mp4
107.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/017-720.webm
107.4 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/1.mp4
107.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/032-720.webm
107.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/045-720.webm
107.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/14.mp4
107.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_043_Using_Debuggers_for_Dumping/015-720_Using_Debuggers_for_Dumping.webm
106.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.5 - Compiled Objects/019-720.webm
106.5 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/35.mp4
106.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/030-720.webm
106.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/12.mp4
106.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_038/001-720.webm
106.4 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/1.mp4
106.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/001-720.webm
106.0 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/042-720.webm
106.0 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/2.mp4
106.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.6 - Bypassing XSS Defense/028-720.webm
105.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_036/001-720.webm
105.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_038/004-720.webm
105.6 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/12.mp4
105.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/6. Mitigating Malware/29. Module Summary 2.mp4
105.6 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/2. Introduction to Lab Exercises/2.mp4
105.1 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/024-720.webm
104.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/16.mp4
104.6 kB
FOR500 - Windows Forensic Analysis/video/2018/7. Windows Forensic Challenge/1. The Forensic Challenge HandsOn Case Study/5.mp4
104.5 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/7.mp4
104.5 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/7.mp4
104.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/1/7.mp4
104.5 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/10. File Carving/8.mp4
104.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.19.mp4
104.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_038/006-720.webm
104.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/026-720_Analyzing_Multi-Technology_Malware.webm
103.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/017-720.webm
103.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/036-720.webm
103.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/018-720.webm
103.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/8. Continuous Delivery and Deployment.mp4
103.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/105-720.webm
103.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/018-720.webm
103.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/008-720_Analyzing_Multi-Technology_Malware.webm
103.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_045_Analyzing_Multi-Technology_Malware/006-720_Analyzing_Multi-Technology_Malware.webm
103.3 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/1. Welcome to Windows Forensic Analysis For500/1.mp4
103.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/003-720.webm
103.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/5.mp4
103.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/027-720.webm
102.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/13.mp4
102.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/052-720.webm
102.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/54.webm
102.8 kB
SEC503 - Network Intrusion Detection/video/2018/0.2 Lab Intro/003-720.webm
102.8 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/53.mp4
102.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/024-720.webm
102.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/020-720.webm
102.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/007-720.webm
102.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/030-720.webm
102.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/017-720.webm
102.2 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/40.mp4
102.2 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/1. Core Windows Forensics II USB Devices and Shell Items Introduction/2.mp4
102.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_034/012-720.webm
102.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/22.mp4
101.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.41.mp4
101.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/018-720.webm
101.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/2.mp4
101.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/38.webm
101.3 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/2. Brief Intro to 508/3.mp4
101.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/019-720.webm
101.2 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/3.mp4
101.1 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/3.mp4
101.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/1/3.mp4
101.1 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/002-720.webm
100.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/44.webm
100.5 kB
SEC503 - Network Intrusion Detection/video/2018/0.2 Lab Intro/008-720.webm
100.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.14.mp4
100.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/012-720.webm
100.1 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/5. For More Information on DevOps 1.mp4
100.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.3 BloodHound/SEC560 - 5.3.7.mp4
99.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/4/30.mp4
99.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/39.webm
99.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/26.webm
99.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/6.mp4
99.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.7 - Attacking Stream Ciphers/016-720.webm
99.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/008-720.webm
99.6 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/3. Automating App Analysis/14. Conclusion.mp4
99.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/001-720.webm
99.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.5 - NoSQL Injection/011-720.webm
99.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/012-720.webm
99.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/019-720.webm
99.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/012-720.webm
99.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/001-720.webm
99.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/020-720.webm
99.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.4 - SQL Injection/005-720.webm
99.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.7 Port Pivot Relay/SEC560 - 3.7.5.mp4
99.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/4.mp4
99.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/025-720.webm
99.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.3 - File Inclusion/021-720.webm
98.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/034-720.webm
98.8 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/52.mp4
98.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/001_526_OnDemand/005-720.webm
98.7 kB
SEC503 - Network Intrusion Detection/video/2018/0.1 Course Intro/005-720.webm
98.7 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/5. Mobile Penetration Testing/1. Mobile Penetration Testing/2. Table of Contents.mp4
98.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/007-720.webm
98.5 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/2. Jailbreaking iOS/17. Command Line Tools.mp4
98.4 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/019-720.webm
98.4 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/4. Cellebrite Physical Analyzer Fundamentals/4. Physical Analyzer Tools Menu.mp4
98.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/29.webm
98.1 kB
FOR500 - Windows Forensic Analysis/video/2018/7. Windows Forensic Challenge/1. The Forensic Challenge HandsOn Case Study/3.mp4
98.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.4 Meterpreter/SEC560 - 3.4.18.mp4
98.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/020-720.webm
97.9 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/2. Introduction to Lab Exercises/3.mp4
97.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/102-720.webm
97.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/025-720.webm
97.3 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/028-720.webm
97.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/026-720.webm
97.1 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/10. Authors and Contributors.mp4
97.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/015-720.webm
96.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/017-720.webm
96.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/4. Dynamic Mobile Application Analysis and Manipulation/7. Application Security Verification/25. Android App Report Card.mp4
96.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/033-720.webm
96.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.25.mp4
96.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/010-720.webm
96.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/101-720.webm
96.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.14.mp4
96.3 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/6. Capture the Flag/1. Capture the Flag/13. Winning.mp4
96.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/001-720.webm
96.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/19.mp4
95.8 kB
SEC503 - Network Intrusion Detection/video/2018/0.2 Lab Intro/006-720.webm
95.7 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/2. Introduction to Lab Exercises/8.mp4
95.7 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/029-720.webm
95.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/025-720.webm
95.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/033-720.webm
95.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/012-720.webm
95.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/5. Student Course Evaluation Section 8/1.mp4
95.1 kB
SEC503 - Network Intrusion Detection/video/2018/5.1 Intro - Network traffic forensics/002-720.webm
94.9 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/35.mp4
94.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/1. Device Architecture and Application Interaction/4. What You Need to Know Android/32. Breaking Changes in Android 2.mp4
94.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/010-720.webm
94.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/010-720 (1).webm
94.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/011-720.webm
94.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/011-720 (1).webm
94.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/2/3.mp4
94.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/001-720_Code_Injection_API_Hooking.webm
94.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/015-720.webm
94.1 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/039-720.webm
94.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/019-720 (1).webm
94.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/023-720.webm
94.0 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/5. Tor/8.mp4
93.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/20.mp4
93.7 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/032-720.webm
93.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/12. Cloud Security.mp4
93.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/018-720.webm
93.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.10 - Attacking PKCS#7/028-720.webm
92.9 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/1. Learning PowerShell Scripting for Security/3. Flow Control Conditional Testing and Loops/1.mp4
92.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/021-720.webm
92.9 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.8 Post-Exploitation With Empire/SEC560 - 3.8.12.mp4
92.8 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.2 Pilfering from Target Machines/SEC560 - 4.2.1.mp4
92.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/001_526_OnDemand/006-720.webm
92.8 kB
SEC503 - Network Intrusion Detection/video/2018/0.1 Course Intro/006-720.webm
92.8 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/077-720.webm
92.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/051-720.webm
92.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/2/6.mp4
92.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/13. Authors and Contributors.mp4
92.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.2 - Methodology and Context/028-720.webm
92.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/034-720.webm
91.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/025-720.webm
91.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/054-720.webm
91.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/001-720.webm
91.6 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/6. Firefox Overview/2.mp4
91.5 kB
SEC503 - Network Intrusion Detection/video/2018/1.1 Intro Fundamental of traffic analysis I/003-720.webm
91.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/001_526_OnDemand/001-720 (1).webm
91.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/001_526_OnDemand/001-720 (2).webm
91.3 kB
SEC503 - Network Intrusion Detection/video/2018/0.1 Course Intro/001-720.webm
91.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/06_526/061_526/002-720.webm
90.9 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/2. Introduction to Lab Exercises/5.mp4
90.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/24.webm
90.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/11. Container Security.mp4
90.7 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/4. Networks Government Business/8. Researching Companies/31.mp4
90.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/33.webm
90.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/001-720.webm
90.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_023/001-720.webm
90.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_024/001-720.webm
90.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.4 - Inline Security Defenses/024-720.webm
90.0 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/048-720.webm
89.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_013/001-720.webm
89.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_015/001-720.webm
89.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/36.webm
89.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.7 - WebSockets/018-720.webm
89.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/37.webm
89.5 kB
SEC503 - Network Intrusion Detection/video/2018/2.6 ICMP/028-720.webm
89.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/017-720.webm
89.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/044-720.webm
89.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_012/001-720.webm
89.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/099-720.webm
89.0 kB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/027-720.webm
88.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.7 Automation, Auditing, and Forensics/33.webm
88.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/34.webm
88.8 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/6.mp4
88.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/6.mp4
88.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/1/6.mp4
88.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/40.webm
88.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/55.webm
88.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/019-720.webm
88.7 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/016-720.webm
88.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/27.webm
88.5 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/5. Domain Domination and Web App Pen Testing/5.9 SQL Injection/SEC560 - 5.9.20.mp4
88.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/029-720.webm
88.1 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/029-720 (1).webm
88.1 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/006-720.webm
88.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/47.webm
88.1 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/3. Collecting User Information/6.mp4
88.0 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.27.mp4
87.9 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/8. Reverse Engineering Ouija.mp4
87.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/045-720.webm
87.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/36.webm
87.8 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/059-720.webm
87.7 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/5.mp4
87.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/5.mp4
87.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/1/5.mp4
87.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/36.webm
87.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/29.webm
87.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/027-720.webm
87.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_022/027-720 (1).webm
87.2 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.28.mp4
87.2 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.6 - Attacking Encryption Keys/016-720.webm
87.1 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/2. The Stolen Device Threat and Mobile Malware/1. The Stolen Device Threat/2. Table of Contents.mp4
87.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section1 - Advanced Attacks/1.6 - XSS and XSRF Together/030-720.webm
87.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/36.webm
86.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/25.webm
86.6 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/024-720.webm
86.6 kB
SEC503 - Network Intrusion Detection/video/2018/1.5 Network Access_Link layer/022-720.webm
86.4 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.5 Vulnerability Scanning/SEC560 - 2.5.26.mp4
86.3 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/043-720.webm
86.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/3. Exploitation/3.7 Port Pivot Relay/SEC560 - 3.7.8.mp4
86.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/045_526/025-720.webm
86.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section5 - Web Application Firewall and Filter Bypass/5.7 - Bypassing SQL Injection Defense/025-720.webm
85.8 kB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/020-720.webm
85.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.8 - Attacking ECB Cipher Mode/023-720.webm
85.6 kB
SEC503 - Network Intrusion Detection/video/2018/5.2 Intro - Network traffic forensics analysis/001-720.webm
85.4 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/44.mp4
85.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/023_526/027-720.webm
85.0 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/009-720.webm
85.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.8 - HTTP2/025-720.webm
84.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/04_526/044_526/038-720.webm
84.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.2 - Hash Length Extensions Attacks/015-720.webm
84.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/2. In-Depth Scanning/2.7 PowerShell for the Pen Tester/SEC560 - 2.7.26.mp4
84.7 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/047-720.webm
84.4 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/010-720.webm
84.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/017-720.webm
84.3 kB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/029-720.webm
84.3 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/011-720.webm
84.3 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/009-720.webm
84.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/3. Decipher the Threats/47. In Summary 1.mp4
83.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/010-720.webm
83.6 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/012-720.webm
83.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/10.mp4
83.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/34.webm
83.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/032-720.webm
83.0 kB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/020-720.webm
82.9 kB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/030-720.webm
82.9 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/017-720.webm
82.8 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/001-720.webm
82.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/016_526/002-720.webm
82.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_011/001-720.webm
81.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_021/039-720.webm
81.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/5/51.mp4
80.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_052/007-720.webm
80.5 kB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/001-720.webm
79.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/017_526/026-720.webm
79.9 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_054/020-720.webm
79.5 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/004-720.webm
79.0 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/110-720.webm
78.9 kB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/025-720.webm
78.9 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/005-720.webm
78.7 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/2. Introduction to Lab Exercises/6.mp4
78.6 kB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/001-720.webm
78.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_038/007-720.webm
78.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/002-720.webm
78.4 kB
SEC503 - Network Intrusion Detection/video/2018/1.2 Why packet/001-720.webm
78.0 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/1. Core Windows Forensics IVInternet Browers Introduction/1.mp4
77.8 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/025-720.webm
77.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/34.webm
77.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/020-720 (1).webm
77.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 1/610_016/028-720.webm
77.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_047_Malware_Memory_Forensics/029-720_Malware_Memory_Forensics.webm
77.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/042-720.webm
76.9 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/21.mp4
76.7 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/001-720.webm
76.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/020-720.webm
76.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/48.webm
76.3 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/005-720.webm
76.3 kB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/021-720.webm
76.1 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/1.mp4
75.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/1.mp4
75.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/1/1.mp4
75.8 kB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/001-720.webm
75.3 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/5. Detecting Evidence Destruction/13. Course Resources and Contact Information.mp4
75.2 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/3. Event Log Analysis/43.mp4
75.2 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/025_526/040-720.webm
74.9 kB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/022-720.webm
74.8 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/041-720.webm
74.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/4. DevOpsSec.mp4
74.4 kB
FOR500 - Windows Forensic Analysis/video/2018/7. Windows Forensic Challenge/1. The Forensic Challenge HandsOn Case Study/6.mp4
74.3 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/6. Analyzing Program Execution Activity/1.mp4
74.3 kB
SEC505 - Securing Windows and PowerShell Automation/video/2020/6. PowerShell Security Ransomware and DevOps/3. Scripting Server Configuration for DevOps/10.mp4
74.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/45.webm
74.1 kB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/022-720.webm
74.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.10.mp4
74.0 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/12. COURSE RESOURCES AND CONTACT INFORMATION.mp4
73.8 kB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/001-720.webm
73.7 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/1. Core Windows Forensics II USB Devices and Shell Items Introduction/1.mp4
73.4 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/011-720.webm
73.4 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/6. For More Information on DevOps 2.mp4
73.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/9.mp4
72.2 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/1.mp4
72.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/037_526/017-720.webm
72.0 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/011_526/003-720.webm
71.5 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/8. Student Course Evaluation Section 2/1.mp4
71.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/6. Student Course Evaluation Section 2/1.mp4
71.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/10/1.mp4
71.3 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/5. Student Course Evaluation Section 4/1.mp4
71.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/8. Student Course Evaluation Section 4/1.mp4
71.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/7/1.mp4
71.3 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/5. Student Course Evaluation Section 3/1.mp4
71.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/12. Student Course Evaluation Section 3/1.mp4
71.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/9/1.mp4
71.3 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/12. Student Course Evaluation Section 1/1.mp4
71.3 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/11. Student Course Evaluation Section 1/1.mp4
71.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/8/1.mp4
71.3 kB
FOR500 - Windows Forensic Analysis/video/2018/7. Windows Forensic Challenge/2. Student Course Evaluation Section 6/1.mp4
71.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/5. Student Course Evaluation Section 6/1.mp4
71.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/2/1.mp4
71.2 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/10. Student Course Evaluation Section 5/1.mp4
71.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/6. Student Course Evaluation Section 5/1.mp4
71.2 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/6/1.mp4
71.2 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/9. Student Course Evaluation Section 7/1.mp4
70.1 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/014-720.webm
69.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/28.webm
69.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/002_526_OnDemand/001-720.webm
69.4 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/2. Introduction to Lab Exercises/9.mp4
68.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/19.webm
68.7 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/001-720.webm
68.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/2.webm
68.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/35.webm
68.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/036_526/017-720.webm
68.2 kB
SEC503 - Network Intrusion Detection/video/2018/0.2 Lab Intro/001-720.webm
68.2 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/8. Android Backups/8. Course Resources and Contact Information.mp4
67.9 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.4 - Languages anf Frameworks/100-720.webm
67.4 kB
SEC503 - Network Intrusion Detection/video/2018/0.2 Lab Intro/004-720.webm
67.3 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/7. DevOps Conferences.mp4
67.3 kB
SEC503 - Network Intrusion Detection/video/2018/4.2 Network Architecture for monitoring/001-720.webm
67.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/20.webm
66.9 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/33.mp4
66.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/56.webm
66.5 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.3 - Web Architectures/028-720.webm
66.5 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/2.mp4
66.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/00_526/001_526_OnDemand/002-720.webm
66.4 kB
SEC503 - Network Intrusion Detection/video/2018/0.1 Course Intro/002-720.webm
66.4 kB
SEC503 - Network Intrusion Detection/video/2018/5.3 Using network flow record/015-720.webm
66.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.7 Risk Management/3.webm
65.9 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/2.mp4
65.8 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/1. Getting Started with SANS OnDemand/1. Welcome to Your SANS OnDemand Course/2.mp4
65.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/1/2.mp4
65.8 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/019-720.webm
65.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/37.webm
65.4 kB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/001-720.webm
65.4 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/014-720.webm
64.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/37.webm
64.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/2. Cornerstone security principles/4.mp4
64.5 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/1. Welcome to Windows Forensic Analysis For500/5.mp4
64.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/30.webm
64.4 kB
FOR585 - Advanced Smartphone Forensics/video/2020/3. iOS Device Forensics/6. Advanced Decoding and Traces of User Activity/29. Course Resources and Contact Information.mp4
63.7 kB
FOR498 - Battlefield Forensics and Data Acquisition/video/2020/6. Beyond the Forensic Tools The Deeper Dive/2. Data Recovery/73.mp4
63.6 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/030-720.webm
63.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/28.webm
63.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/1. Getting Started with SANS OnDemand/2/1.mp4
63.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/024_526/004-720.webm
62.2 kB
SEC575 - Mobile Device Security and Ethical Hacking/video/2019/3. Static Application Analysis/5. Third Party App Platforms/31. Exercise Xamarin App Analysis.mp4
62.0 kB
FOR585 - Advanced Smartphone Forensics/video/2020/5. ThirdParty Application Analysis/6. Forensic Capstone Prep/3. Course Resources and Contact Information.mp4
61.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/3.webm
61.9 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/02_526/021_526/001-720.webm
61.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/16.webm
61.6 kB
FOR585 - Advanced Smartphone Forensics/video/2020/2. Android Forensics/6. Google Cloud Extractions and Analysis/9. Course Resources and Contact Information.mp4
61.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/13.webm
60.8 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section3 - Web Cryptography/3.9 - Attacking CBC Cipher Mode/015-720.webm
60.5 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/002-720.webm
60.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/26.webm
60.0 kB
SEC503 - Network Intrusion Detection/video/2018/5.4 C2 traffic and large pcap analysis/019-720.webm
59.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/3.webm
59.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/37.webm
59.4 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/1. Strategic Planning Foundations/2. Decipher the Business/75. Lab Debrief 3.mp4
59.3 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/2. Introduction to Lab Exercises/7.mp4
59.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/7.webm
58.0 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/1. Registry Forensics/3.mp4
57.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.2 Defense-in-Depth/8.webm
57.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/5.webm
57.4 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/9. Leveraging Search Engines/21.mp4
57.2 kB
FOR585 - Advanced Smartphone Forensics/video/2020/4. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction/1. iOS Backup File Forensics/1. iOS Backups Malware and Spyware Forensics and Detecting Evidence Destruction 1.mp4
57.1 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/7. Hacker Tools Workshop/1/7.mp4
57.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/4/15.mp4
56.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/27.webm
56.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/23.webm
56.1 kB
SEC503 - Network Intrusion Detection/video/2018/3.5 Bootcamp - researching protocols/002-720.webm
55.9 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/1. Core Windows Forensics IVInternet Browers Introduction/3.mp4
55.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/30.webm
55.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/5. The Dark Web Breach Data and International Issues/9. Putting It All Together/6.mp4
55.5 kB
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/1. Foundation of OSINT/3. Goals of OSINT Collection/29.mp4
55.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/37.webm
55.1 kB
SEC503 - Network Intrusion Detection/video/2018/0.2 Lab Intro/009-720.webm
55.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.5 SIEM-Log Management/14.webm
54.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/41.webm
54.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/22.webm
54.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.3 Cryptography Algorithms and Deployment/3.webm
54.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/20.webm
54.0 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section4 - Alternative Web Interfaces/4.6 - Web Services/021-720.webm
53.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.6 Active Defense/10.webm
53.4 kB
SEC503 - Network Intrusion Detection/video/2018/4.6 BootCamp - Real world snort and bro/002-720.webm
53.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/19.webm
52.9 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/8. Data Stream Carving/9.mp4
52.7 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/1. Comprehensive Pen Test Planning, Scoping, and Recon/1.4 Appendix - Intro to Linux/SEC560 - 1.4.42.mp4
52.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.2 Defensible Network Architecture/16.webm
52.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.8 SUMMARY/SEC542- SANS OnDemand_6_2.webm
52.0 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/5/22.mp4
51.9 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/10. File Carving/9.mp4
51.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/23.webm
51.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/3.webm
51.5 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/5/11.mp4
51.4 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/05_526/051_526/001-720.webm
51.1 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/11. Quiz/1.mp4
50.9 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/7. Quiz/1.mp4
50.9 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/4. Quiz/1.mp4
50.9 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/4. Quiz/1.mp4
50.9 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/9. Quiz/1.mp4
50.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/2. Overview and Security & Risk Management/10. Quiz/1.mp4
50.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/3. Asset Security/5. Quiz/1.mp4
50.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/4. Security Architecture and Engineering/11. Quiz/1.mp4
50.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/7. Quiz/1.mp4
50.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/6. Identity and Access Management/5. Quiz/1.mp4
50.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/7. Security Assessment and Testing/4. Quiz/1.mp4
50.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/8. Security Operations/8. Quiz/1.mp4
50.9 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/9. Software Development Security/4. Quiz/1.mp4
50.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/7/1.mp4
50.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/3. Computer and Network Hacker Exploits Part 1/9/1.mp4
50.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/8/1.mp4
50.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/6/1.mp4
50.9 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/5/1.mp4
50.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/29.webm
50.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/3.webm
50.7 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/3/29.mp4
50.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.2 Linux Security Structure Permission and Access/3.webm
50.4 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/4. Computer and Network Hacker Exploits Part 2/3/19.mp4
50.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/5. Computer and Network Hacker Exploits Part 3/4/41.mp4
50.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/38.webm
50.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_046_Code_Injection_API_Hooking/020-720_Code_Injection_API_Hooking.webm
49.7 kB
SEC503 - Network Intrusion Detection/video/2018/6.1 Netwars - IDS version/003-720.webm
49.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.5 Critical Security Controls/7.webm
49.0 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/3. Analyzing USB Devices/42.mp4
48.6 kB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/009-720.webm
48.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/25.webm
48.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/42.webm
48.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.4 Network Device Security/3.webm
48.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.7 Advanced Persistent Threat/21.webm
47.6 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 5/5.8 SUMMARY/SEC542- SANS OnDemand_4_2.webm
47.1 kB
FOR500 - Windows Forensic Analysis/video/2018/6. Core Windows Forensics IV Internet Browsers/8. Private Browsing/17.mp4
46.9 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/111-720.webm
46.7 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/2. Cloud Infrastructure Orchestration/4. Container Security/43. NetWars Bonus Challenges.mp4
46.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/3. Cloud Security Operations/5. Secrets Management/41. NetWars Bonus Challenges.mp4
46.5 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/5. Compliance as Code/6. Bonus Challenges and Additional Resources/1. NetWars Bonus Challenges.mp4
46.4 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/2. The Donald Blake Case/2.mp4
46.3 kB
SEC503 - Network Intrusion Detection/video/2018/2.7 Bootcamp - Command line/021-720.webm
46.3 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/6. Filesystem Overview/2.mp4
46.2 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_038/002-720.webm
46.1 kB
SEC503 - Network Intrusion Detection/video/2018/3.1 Packet drafting for IDS_IPS/025-720.webm
45.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 5/610_056/003-720 (1).webm
45.6 kB
SEC540 - Cloud Security and DevOps Automation/video/2020/4. Cloud Security as a Service/4. Serverless Security/28. NetWars Bonus Challenges.mp4
45.6 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/012-720.webm
45.3 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/6. Computer and Network Hacker Exploits Part 4/2/55.mp4
45.1 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/2. Additional Artifacts/2.mp4
44.6 kB
SEC503 - Network Intrusion Detection/video/2018/2.2 WireShark Display Filter/031-720.webm
44.5 kB
FOR500 - Windows Forensic Analysis/video/2018/4. Core Windows Forensics II USB Devices and Shell Items/2. Shell Item Analysis/1.mp4
44.3 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/8. Data Stream Carving/2.mp4
44.0 kB
SEC503 - Network Intrusion Detection/video/2018/3.5 Bootcamp - researching protocols/009-720.webm
43.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/29.webm
43.3 kB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/034-720.webm
43.2 kB
FOR500 - Windows Forensic Analysis/video/2018/5. Core Windows Forensics III Email Key Additional Artifacts and Event Logs/1. Email Forensics/3.mp4
42.7 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_037/002-720.webm
42.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/8.webm
42.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.6 Secure Windows Network Services/29.webm
42.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/6. Penetration Testing Workshop/6.1 Penetration Testing Workshop/SEC560 - 6.1.25.mp4
41.6 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/013_526/002-720.webm
41.4 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_033/002-720.webm
41.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/3.webm
41.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.5 Enforcing Security Policy/39.webm
40.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/3.webm
40.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.4 Windows Access Controls/35.webm
40.3 kB
FOR500 - Windows Forensic Analysis/video/2018/2. Windows Digital Forensics And Advanced Data Triage/10. File Carving/2.mp4
40.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/3.webm
40.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/10.webm
39.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/05 Windows Security/5.2 The Windows Security Infrastructure/38.webm
39.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.6 Securing Wireless Networks/3.webm
39.5 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/01_526/012_526/001-720.webm
39.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/5.webm
38.9 kB
MGT514 - Security Strategic Planning, Policy, and Leadership/video/2019/5. Strategic Planning Workshop/3. Summary/11. SANS Technology Institute STI.mp4
38.8 kB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/video/2018/2. Incident Handling StepbyStep and Computer Crime Investigatio/6/23.mp4
38.8 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/027-720.webm
38.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 3/610_035/002-720.webm
38.6 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_026/002-720.webm
38.5 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/029-720.webm
38.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.6 Malicious Code and Exploit Mitigations/36.webm
38.0 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/031-720.webm
37.8 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.4 Endpoint Security/38.webm
37.7 kB
FOR500 - Windows Forensic Analysis/video/2018/1. Getting Started with SANS OnDemand/2. Introduction to Lab Exercises/1.mp4
37.6 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.5 Incident Handling Foundations/31.webm
37.5 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.4 Applying Cryptography/38.webm
37.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/57.webm
37.4 kB
SEC503 - Network Intrusion Detection/video/2018/3.4 IDS_IPS Evasion/026-720.webm
37.3 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.2 Vulnerability Scanning and Penetration Testing/46.webm
37.1 kB
SEC560 - Network Penetration Testing and Ethical Hacking/video/2019/4. Password Attacks - Merciless Pivoting/4.5 Password Guessing with Hydra/SEC560 - 4.5.6.mp4
37.1 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.4 Security Policies/29.webm
37.0 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 4/610_042_Getting_Started_with_Unpacking/002-720_Getting_Started_with_Unpacking.webm
37.0 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/04 Cryptography and Risk Management/4.2 Cryptography/49.webm
36.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.5 Networking and Protocols/42.webm
36.7 kB
MGT414 - SANS Training Program for CISSP Certification/video/2019/5. Communications and Network Security/1. Network Architecture Design Principles/3.mp4
36.7 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/02 Defense in-Depth and Attacks/2.3 Access Control and Password Management/28.webm
36.5 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_027/002-720.webm
36.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.3 Virtualization and Cloud Security/34.webm
36.2 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/033-720.webm
36.2 kB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/017-720.webm
34.4 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/01 Network Security Essentials/1.7 Securing Web Communications/22.webm
34.0 kB
FOR500 - Windows Forensic Analysis/video/2018/3. Core Windows Forensics I Windows Registry/5. Analyzing User and Program Execution Activity/16.mp4
33.9 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/003-720.webm
32.4 kB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/002-720.webm
31.9 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/03 Threat Management/3.3 Network Security Devices/52.webm
31.6 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/060-720.webm
31.1 kB
SEC503 - Network Intrusion Detection/video/2018/3.3 Application protocols and detection/002-720.webm
30.9 kB
SEC503 - Network Intrusion Detection/video/2018/2.5 UDP/002-720.webm
30.8 kB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/video/2018/Day 2/610_025/002-720.webm
30.8 kB
FOR585 - Advanced Smartphone Forensics/video/2020/1. Smartphone Overview Fundamentals of Analysis SQLite/1. Introduction to Smartphone Overview Fundamentals of Analysis SQLite/2. FOR585 Dedications.mp4
30.6 kB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/010-720.webm
30.3 kB
SEC503 - Network Intrusion Detection/video/2018/2.3 Writing TCPdump filter/025-720.webm
30.1 kB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/035-720.webm
30.1 kB
SEC503 - Network Intrusion Detection/video/2018/1.3 Concept of TCPIP/025-720.webm
30.0 kB
SEC503 - Network Intrusion Detection/video/2018/4.3 Intro to IDS_IPS analysis/010-720.webm
29.8 kB
SEC503 - Network Intrusion Detection/video/2018/3.5 Bootcamp - researching protocols/003-720.webm
29.2 kB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/004-720.webm
28.6 kB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/010-720.webm
28.5 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/002-720.webm
28.2 kB
SEC401 - Security Essentials Bootcamp Style/video/2017/06 Linux Security Essentials/6.5 Security Utilities/5.webm
27.6 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/002-720.webm
27.5 kB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/002-720.webm
27.4 kB
SEC503 - Network Intrusion Detection/video/2018/1.7 IP Layer - Fragmentation/021-720.webm
26.1 kB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/002-720.webm
25.7 kB
SEC503 - Network Intrusion Detection/video/2018/1.8 Bootcamp - IPV6/038-720.webm
24.9 kB
SEC503 - Network Intrusion Detection/video/2018/4.4 Snort/043-720.webm
24.4 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/002-720.webm
23.5 kB
SEC503 - Network Intrusion Detection/video/2018/1.6 IP Layer - IPV4/029-720.webm
23.3 kB
SEC503 - Network Intrusion Detection/video/2018/1.4 Intro to WireShark/006-720.webm
23.2 kB
SEC503 - Network Intrusion Detection/video/2018/2.4 TCP/010-720.webm
23.1 kB
SEC503 - Network Intrusion Detection/video/2018/4.5 Bro/019-720.webm
22.5 kB
SEC503 - Network Intrusion Detection/video/2018/3.2 WireShark Part III/023-720.webm
20.8 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/035_526/.DS_Store
6.1 kB
FOR526 - Advanced Memory Forensics and Threat Detection/video/2018/03_526/031_526/.getxfer.32948.1103.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.12.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.14.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.15.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.16.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.17.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.18.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.24.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.28.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.32.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.33.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.34.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.35.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.36.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.37.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.38.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.39.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.40.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.41.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.42.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.43.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.44.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.45.mega
0 Bytes
SEC487 - Open Source Intelligence (OSINT) Gathering and Analysis/video/2019/3. Social Media Geolocation and Imagery/7. Imagery and Maps/.getxfer.1260.46.mega
0 Bytes
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 1/1.4 WEB APPLICATION PEN TESTER'S TOOLKIT/.getxfer.4936.63.mega
0 Bytes
SEC542 - Web App Penetration Testing and Ethical Hacking/video/2019/Section 3/3.3-Bypass Flaws/.getxfer.4936.132.mega
0 Bytes
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/video/2019/Section2 - Web Frameworks/2.2 - Content Management Systems/003-720~1.webm.encrypted
0 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>