03. Command Line Basics/Module 2 - Introductory Commands/2.4 Common Linux Tools.mp4 94.1 MB
08. Post Exploitation Hacking/Section 2/2.09 Linux Sniffing.mp4 82.6 MB
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.07 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4 79.8 MB
08. Post Exploitation Hacking/Section 4/4.3 Windows Logs, Timestamps, & Passwords Lecture.mp4 75.7 MB
03. Command Line Basics/Module 1 - Introduction to the Command Line/1.3 Asking for Help.mp4 75.2 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.12 Linux Networking Part 2.mp4 73.5 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.09 Common Commands Part 2.mp4 73.1 MB
08. Post Exploitation Hacking/Section 2/2.02 Linux Host Information Gathering (part 2) netstat.mp4 72.2 MB
08. Post Exploitation Hacking/Section 2/2.11 Windows Host Information Gathering Lecture.mp4 72.0 MB
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.3 Sensitive Data Exposure NIKTO Lab Instructions Part 2.mp4 71.8 MB
08. Post Exploitation Hacking/Section 2/2.06 Linux Scanning Lab.mp4 71.2 MB
10. OWASP Top 10/Module 10 - Using Components with Known Vulnerabilities/10.3 Using Components with Known Vulnerabilities Lab Instructions Part 2.mp4 67.0 MB