589689.xyz

[Codered] [EC-Council] 15 Курсов по кибербезопасности (2021)

  • 收录时间:2022-04-10 21:52:54
  • 文件大小:29GB
  • 下载次数:1
  • 最近下载:2022-04-10 21:52:54
  • 磁力链接:

文件列表

  1. 4. Course Wireless Pentesting with the Raspberry Pi/8.Intrusion Analysis- Logging, Monitoring, and Detection.mkv 734MB
  2. 4. Course Wireless Pentesting with the Raspberry Pi/4. Lab 01 Wi-Fi Hacking.mkv 431MB
  3. Course Metasploit Like a Pro/Chapter 3 Working with Exploits, Payloads, and Shells/3.1. Working with Exploits, Payloads, and Shells.mp4 421MB
  4. Course Metasploit Like a Pro/Chapter 4 Process Migration with Meterpreter and Meterpreter Functions/4.1. Meterpreter Basics.mp4 362MB
  5. Course Metasploit Like a Pro/Chapter 3 Working with Exploits, Payloads, and Shells/3.3 Understanding Shells.mp4 336MB
  6. Course Metasploit Like a Pro/Chapter 6 Privilege Escalation and Persistence/6.4. Privilege Escalation Techniques.mp4 329MB
  7. 4. Course Wireless Pentesting with the Raspberry Pi/9. Intrusion Analysis- Logging, Monitoring, and Detection.mkv 282MB
  8. Course Metasploit Like a Pro/Chapter 5 Firewalls, Antivirus, and External Callbacks/5.2. Antivirus Concepts.mp4 275MB
  9. Course Metasploit Like a Pro/Chapter 3 Working with Exploits, Payloads, and Shells/3.2. Managing Payloads.mp4 265MB
  10. 4. Course Wireless Pentesting with the Raspberry Pi/10. Lab 02- Basic Malware Analysis.mkv 263MB
  11. 3. Course Identity And Access Management/11. Technologies p1.mkv 254MB
  12. Course Metasploit Like a Pro/Chapter 5 Firewalls, Antivirus, and External Callbacks/5.3. Generating Payloads with MSFVenom.mp4 253MB
  13. 3. Course Identity And Access Management/8. Cloud.mkv 250MB
  14. 14. Course Computer Forensics Best Practices/5.4 Analysis Tools Demonstration.mkv 249MB
  15. 3. Course Identity And Access Management/3.1 Key Concepts part2.mkv 239MB
  16. Course Metasploit Like a Pro/Chapter 2 Getting Up and Running with Metasploit Basics/2.1. Exploring Metasploit Console Basics.mp4 237MB
  17. 3. Course Identity And Access Management/5. IAM Guidance and Standards.mkv 231MB
  18. 3. Course Identity And Access Management/3. Key Concepts part1.mkv 230MB
  19. 6. Course Wireshark for Ethical Hackers/1.4 Understanding Nmap Scan.mkv 226MB
  20. Course Metasploit Like a Pro/Chapter 2 Getting Up and Running with Metasploit Basics/2.5. Discovering Hosts.mp4 226MB
  21. Course Metasploit Like a Pro/Chapter 2 Getting Up and Running with Metasploit Basics/2.6. Scanning and Fingerprinting Services.mp4 212MB
  22. Course Metasploit Like a Pro/Chapter 6 Privilege Escalation and Persistence/6.1. Persistence Techniques with Meterptreter.mp4 209MB
  23. Course Metasploit Like a Pro/Chapter 4 Process Migration with Meterpreter and Meterpreter Functions/4.2. Exploring Meterpreter Modules.mp4 203MB
  24. 1. Course Hands-on Android Security/Chapter 4 Reversing and Creating Android Malware/4.4. Creating Android Malware from Scratch.mkv 201MB
  25. Course Metasploit Like a Pro/Chapter 7 Lateral Movement, Pivoting, and Common Practices/7.1. Pass-The-Hash.mp4 192MB
  26. 3. Course Identity And Access Management/4. Organizational Processes.mkv 192MB
  27. 3. Course Identity And Access Management/10. Implementation.mkv 189MB
  28. 1. Course Hands-on Android Security/Chapter 3 Attacking Android Platforms/3.4. Creating Malicious Apk for Penetration Testing.mkv 186MB
  29. 4. Course Wireless Pentesting with the Raspberry Pi/7. Lab 03 Radio Frequency Hacking.mkv 182MB
  30. Course Metasploit Like a Pro/Chapter 7 Lateral Movement, Pivoting, and Common Practices/7.2. Investigating the Box.mp4 179MB
  31. 14. Course Computer Forensics Best Practices/7.1 Case Studies.mkv 179MB
  32. 1. Course Hands-on Android Security/Chapter 3 Attacking Android Platforms/3.2. Penetration Testing Android Application.mkv 175MB
  33. 6. Course Wireshark for Ethical Hackers/4.7 Detecting MAC Flooding.mkv 168MB
  34. 13. Course Getting Started with Vulnerability Analysis and Management/4.3 Configuration Linux.mkv 167MB
  35. 3. Course Identity And Access Management/12. Establishing Identity.mkv 165MB
  36. Course Metasploit Like a Pro/Chapter 7 Lateral Movement, Pivoting, and Common Practices/7.3. Pivoting Concepts.mp4 164MB
  37. 5. Course Information Security for Dummies/3.1. Human Security.mkv 164MB
  38. 3. Course Identity And Access Management/1.1 Introduction.mkv 163MB
  39. 4. Course Wireless Pentesting with the Raspberry Pi/2. Overview of Hacking Methodologies.mkv 158MB
  40. 6. Course Wireshark for Ethical Hackers/1.5 ICMP Protocol Analysis.mkv 158MB
  41. Course Metasploit Like a Pro/Chapter 2 Getting Up and Running with Metasploit Basics/2.4. Getting Familiar with Modules.mp4 157MB
  42. 3. Course Identity And Access Management/2. Governance.mkv 155MB
  43. 13. Course Getting Started with Vulnerability Analysis and Management/2.1 Open Port ASnalysis.mkv 154MB
  44. 4. Course Wireless Pentesting with the Raspberry Pi/12. Lab 04- Forensic Triage.mkv 153MB
  45. 7. Course In the Trenches Security Operations Center/2.2 SOC.mkv 152MB
  46. 7. Course In the Trenches Security Operations Center/3.1 Hacker Tactics.mkv 151MB
  47. Course Metasploit Like a Pro/Chapter 2 Getting Up and Running with Metasploit Basics/2.2. Understanding Active and Passive Recon.mp4 150MB
  48. Course Metasploit Like a Pro/Chapter 5 Firewalls, Antivirus, and External Callbacks/5.1. Firewall Concepts.mp4 150MB
  49. Course Metasploit Like a Pro/Chapter 1 Getting Started with Metasploit/1.3.Installing ISO Images or Virtual Image Files.mp4 148MB
  50. 7. Course In the Trenches Security Operations Center/6.1 Vulnerability Management.mkv 147MB
  51. Features and Tools Vimeo (33).mp4 146MB
  52. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo (9).mp4 146MB
  53. Course Metasploit Like a Pro/Chapter 5 Firewalls, Antivirus, and External Callbacks/5.4. Encoding Payloads.mp4 144MB
  54. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 7 Network Analysis/7.3. Analyzing IP Header Part 2.mp4 140MB
  55. 1. Course Hands-on Android Security/Chapter 2 Interacting with Android/2.1. Working with Emulator.mp4 140MB
  56. 7. Course In the Trenches Security Operations Center/5.2 Find Evil part1.mkv 134MB
  57. 1. Course Hands-on Android Security/Chapter 4 Reversing and Creating Android Malware/4.2. Using Static Analysis for Reversing Android Malware.mkv 133MB
  58. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/2.3 malware.mkv 130MB
  59. 5. Course Information Security for Dummies/4.2 PKI.mkv 130MB
  60. 1. Course Hands-on Android Security/Chapter 2 Interacting with Android/2.3. Android over the Network.mp4 126MB
  61. Course Metasploit Like a Pro/Chapter 1 Getting Started with Metasploit/1.4.Understanding Network Configuration Settings.mp4 126MB
  62. 14. Course Computer Forensics Best Practices/5.3 Disk Drive Technology.mkv 122MB
  63. Course Metasploit Like a Pro/Chapter 8 Final Thoughts and Wrapping Up/8.1. Other Resources.mp4 121MB
  64. 4. Course Wireless Pentesting with the Raspberry Pi/1. Understanding Hacking Concepts.mkv 119MB
  65. 5. Course Information Security for Dummies/0. Course Roadmap.mkv 119MB
  66. 4. Course Wireless Pentesting with the Raspberry Pi/11. Lab 03- Forensic Triage.mkv 118MB
  67. Course Metasploit Like a Pro/Chapter 1 Getting Started with Metasploit/1.1. Introduction to Metasploit and Pentesting.mp4 118MB
  68. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/2.6 Harassment.mkv 117MB
  69. 14. Course Computer Forensics Best Practices/6.1 Presentation of Digital Evidence.mkv 116MB
  70. 7. Course In the Trenches Security Operations Center/7.1 Incident Response.mkv 116MB
  71. 7. Course In the Trenches Security Operations Center/3.2 ATT&CK.mkv 115MB
  72. 12 Course Hands-on Azure Data Factory and Security/2.1 Create and Deploy Azure.mkv 115MB
  73. Course Metasploit Like a Pro/Chapter 5 Firewalls, Antivirus, and External Callbacks/5.6. Redirect Concept.mp4 114MB
  74. 6. Course Wireshark for Ethical Hackers/1.2 Port and IP Filtering.mkv 113MB
  75. 14. Course Computer Forensics Best Practices/5.1 Analysis of DE.mkv 111MB
  76. 6. Course Wireshark for Ethical Hackers/4.4 Decrypt SSL and TLS Traffic.mkv 110MB
  77. 6. Course Wireshark for Ethical Hackers/2.1 Analyzing HTTP Packets.mkv 109MB
  78. 5. Course Information Security for Dummies/2.3 Threats and Attacks Overview.mkv 109MB
  79. 7. Course In the Trenches Security Operations Center/4.3 Data Loss Prevention.mkv 107MB
  80. Course Metasploit Like a Pro/Chapter 2 Getting Up and Running with Metasploit Basics/2.3.Using NMAP.mp4 106MB
  81. 14. Course Computer Forensics Best Practices/3.1 Collection of Digital Evidence.mkv 105MB
  82. 14. Course Computer Forensics Best Practices/4.1.mkv 105MB
  83. 12 Course Hands-on Azure Data Factory and Security/3.1 Mount Azure Blob Storage.mkv 105MB
  84. 12 Course Hands-on Azure Data Factory and Security/2.4 Manage and Automate.mkv 104MB
  85. 6. Course Wireshark for Ethical Hackers/3.3 PDF and ZIP File Saving.mkv 103MB
  86. 5. Course Information Security for Dummies/5.1 Introduction to Security Policy Compliance.mkv 101MB
  87. 6. Course Wireshark for Ethical Hackers/4.10 Detect Brute Force Attacks.mkv 101MB
  88. 3. Course Identity And Access Management/11.1 Technologies p2.mkv 98MB
  89. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.9. Getting Source and Destination MAC Address from Received Packets.mp4 98MB
  90. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.4. Crafting Malicious ARP Packet.mp4 97MB
  91. 14. Course Computer Forensics Best Practices/2.1 Identification of Digital Evidence.mkv 96MB
  92. 7. Course In the Trenches Security Operations Center/1.1 Lab Seup.mkv 95MB
  93. 2. Course Black Hat Python Python For Pentesters/Chapter 4 The Password Cracker Working with Brute-Force Tools/4.2 Pre-Computed Wordlists.mkv 95MB
  94. Course Metasploit Like a Pro/Chapter 1 Getting Started with Metasploit/1.2. Downloading the Requirement Software and Images.mp4 93MB
  95. 15. Course End-to-End Mobile Security/5.2 Email Phishing.mkv 93MB
  96. 5. Course Information Security for Dummies/3.2 Access Control and Physical Security.mkv 93MB
  97. 12 Course Hands-on Azure Data Factory and Security/3.2 Reading Data from External Sources.mkv 89MB
  98. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 4 Password Cracking/4.4. Cracking Crypt Passwords with Salt.mp4 89MB
  99. 1. Course Hands-on Android Security/Chapter 2 Interacting with Android/2.2. Setting up Android Device and ADB.mp4 88MB
  100. 15. Course End-to-End Mobile Security/2.4 Application for Security.mkv 87MB
  101. 7. Course In the Trenches Security Operations Center/4.1 Defensive Tools.mkv 87MB
  102. 6. Course Wireshark for Ethical Hackers/4.9 Examining Tor Traffic.mkv 86MB
  103. 4. Course Wireless Pentesting with the Raspberry Pi/5. Lab 02 Wi-Fi Hacking.mkv 86MB
  104. 6. Course Wireshark for Ethical Hackers/1.1 Enabling Monitor Mode.mkv 85MB
  105. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.1. Stealing Saved Wireless Passwords.mp4 85MB
  106. 6. Course Wireshark for Ethical Hackers/4.13 Identify a Bot-Infected Host.mkv 85MB
  107. 11. Course Hands-on-Azure Databricks and Security/3.3 Mapping Data Flow.mkv 84MB
  108. 6. Course Wireshark for Ethical Hackers/2.4 Capturing a Wireless Traffic.mkv 83MB
  109. 1. Course Hands-on Android Security/Chapter 4 Reversing and Creating Android Malware/4.3.Using Dynamic Analysis for Reversing Android Malware.mkv 83MB
  110. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/3.3 Fake News.mkv 82MB
  111. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 7 Network Analysis/7.4. Analyzing TCP Header.mp4 82MB
  112. Course Metasploit Like a Pro/Chapter 6 Privilege Escalation and Persistence/6.2. Persistence Techniques with Netcat.mp4 81MB
  113. 5. Course Information Security for Dummies/1.2 Risk.mkv 80MB
  114. 8. Course Common Cybersecurity Attacks and Defense Strategies/1.1 Phishing.mkv 80MB
  115. 12 Course Hands-on Azure Data Factory and Security/4.4 Configure CICD.mkv 80MB
  116. 6. Course Wireshark for Ethical Hackers/4.12 A Deeper Look.mkv 79MB
  117. 11. Course Hands-on-Azure Databricks and Security/2.3 Move File Using Template.mkv 77MB
  118. 2. Course Black Hat Python Python For Pentesters/Chapter 2 Working with Python Network Recon Framework/2.2 Making a Port Scanner.mkv 76MB
  119. 2. Course Black Hat Python Python For Pentesters/Chapter 3 The Python Spy Web Recon/3.2 Web Page Scraping.mkv 76MB
  120. 6. Course Wireshark for Ethical Hackers/2.6 Sniff the Activity Over USB Interfaces.mkv 76MB
  121. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 10 Command and Control Center/10.7. Attacking Multiple Targets and Gathering Botnet.mp4 75MB
  122. 13. Course Getting Started with Vulnerability Analysis and Management/3.2 SQL Injection.mkv 75MB
  123. 6. Course Wireshark for Ethical Hackers/4.8 Detection of ARP Cache Poisoning.mkv 75MB
  124. 7. Course In the Trenches Security Operations Center/5.1 Event Monitoring.mkv 74MB
  125. 1. Course Hands-on Android Security/Chapter 1 Welcome to the World of Android/3. Platform Architecture and Components.mp4 74MB
  126. 8. Course Common Cybersecurity Attacks and Defense Strategies/1.2 Spear-phishing.mkv 71MB
  127. 2. Course Black Hat Python Python For Pentesters/Chapter 3 The Python Spy Web Recon/3.3 Phishing Going from Recon to Creds.mkv 71MB
  128. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.9. Changing HTTP Headers.mp4 70MB
  129. 15. Course End-to-End Mobile Security/5.5 Sudo and Burner.mkv 70MB
  130. 7. Course In the Trenches Security Operations Center/2.1 Introduction.mkv 69MB
  131. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 1 - Introduction and Setup/1.3.Adjusting Guest Additions.mp4 68MB
  132. 12 Course Hands-on Azure Data Factory and Security/2.3 Create Notebooks and Run Initial Databricks.mkv 68MB
  133. 5. Course Information Security for Dummies/2.1 Section.mkv 67MB
  134. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.2. Coding MAC Address Changer.mp4 66MB
  135. 2. Course Black Hat Python Python For Pentesters/Chapter 5 Evade Antivirus with Python/5.2 Evading Antivirus Checking.mkv 66MB
  136. 6. Course Wireshark for Ethical Hackers/3.6 Identifying Host and User.mkv 66MB
  137. 15. Course End-to-End Mobile Security/4.2 Geolacation by Photos.mkv 66MB
  138. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 3 SSH and FTP Attacks/3.7. Username and Password List Attack on FTP.mp4 66MB
  139. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 4 Password Cracking/4.2. Cracking SHA1 Hash with Online Dictionary.mp4 66MB
  140. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 7 Network Analysis/7.5. Analyzing UDP Header.mp4 66MB
  141. 11. Course Hands-on-Azure Databricks and Security/3.2 Databricks Integration.mkv 64MB
  142. 11. Course Hands-on-Azure Databricks and Security/1.1 Azure Data Factory.mkv 64MB
  143. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/1.1 Understanding.mkv 64MB
  144. 11. Course Hands-on-Azure Databricks and Security/1.2 Data Factory Core Components.mkv 64MB
  145. 5. Course Information Security for Dummies/4.1 Cryptography Basics.mkv 64MB
  146. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/5.1 Staying Safe.mkv 64MB
  147. 13. Course Getting Started with Vulnerability Analysis and Management/1.6 CVE and CVSS score.mkv 64MB
  148. 13. Course Getting Started with Vulnerability Analysis and Management/1.5 Setting up Your VA Environment.mkv 64MB
  149. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 9 Coding a Keylogger/9.4. Features and Tools Vimeo.mp4 63MB
  150. 15. Course End-to-End Mobile Security/2.1 Application Security.mkv 63MB
  151. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 10 Command and Control Center/10.5. Fixing Q Command.mp4 63MB
  152. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 8 Multi-functioning Reverse Shell/8.14. Capturing Screenshot on Target PC.mp4.yandex_disk_download 63MB
  153. 6. Course Wireshark for Ethical Hackers/4.6 Detecting ICMP Flooding -Smurf Attack.mkv 62MB
  154. 2. Course Black Hat Python Python For Pentesters/Chapter 4 The Password Cracker Working with Brute-Force Tools/4.5 Cracking Linux Hashes.mkv 62MB
  155. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 10 Command and Control Center/10.6. Coding Exit Function.mp4 62MB
  156. 13. Course Getting Started with Vulnerability Analysis and Management/3.5 Nessus.mkv 62MB
  157. 8. Course Common Cybersecurity Attacks and Defense Strategies/1.3 Whaling.mkv 61MB
  158. 1. Course Hands-on Android Security/Chapter 1 Welcome to the World of Android/5.Android Apps Building Blocks.mp4 61MB
  159. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/2.1 Fundementals.mkv 61MB
  160. 6. Course Wireshark for Ethical Hackers/4.3 Detecting Christmas Tree Attacck.mkv 61MB
  161. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 1 - Introduction and Setup/1.1. VirtualBox Install.mp4 60MB
  162. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/2.2 Evolution and Definitions.mkv 60MB
  163. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.4. Bruteforcing Any Login Page Part 1.mp4 60MB
  164. 13. Course Getting Started with Vulnerability Analysis and Management/4.2 Configeration review Windows.mkv 60MB
  165. 13. Course Getting Started with Vulnerability Analysis and Management/3.1 Web Application.mkv 60MB
  166. 5. Course Information Security for Dummies/5.2 ISP overview.mkv 59MB
  167. 14. Course Computer Forensics Best Practices/5.2 Mobile Phone Evidence.mkv 59MB
  168. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 7 Network Analysis/7.1. Analyzing Ethernet Header.mp4 58MB
  169. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 1 - Introduction and Setup/1.2. Kali Linux Install.mp4 58MB
  170. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.13. Printing Usage and Testing Our Program.mp4 58MB
  171. 14. Course Computer Forensics Best Practices/1.2 What is Expert Witness.mkv 58MB
  172. 6. Course Wireshark for Ethical Hackers/2.2 Check Out Sneaky Non-Standard Port Use.mkv 58MB
  173. 15. Course End-to-End Mobile Security/4.1 How You Can be Tracked with Your Phone.mkv 57MB
  174. 13. Course Getting Started with Vulnerability Analysis and Management/2.2 Man In The Middle.mkv 57MB
  175. Course Metasploit Like a Pro/Chapter 6 Privilege Escalation and Persistence/6.3. Persistence Techniques with RDP.mp4 57MB
  176. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.14.Taking a Look at Ransomware.mp4 57MB
  177. 11. Course Hands-on-Azure Databricks and Security/2.2 Understand Pipline,Activities, and Linked Service.mkv 57MB
  178. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.8. Returning Banner from Open Port.mp4 57MB
  179. 1. Course Hands-on Android Security/Chapter 3 Attacking Android Platforms/3.3.Installing and Using an Android Penetration Testing Framework.mkv 57MB
  180. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/1.1 Introduction.mkv 56MB
  181. 13. Course Getting Started with Vulnerability Analysis and Management/3.4 Burp Suite.mkv 56MB
  182. 11. Course Hands-on-Azure Databricks and Security/4.2 Logging and Creating Dashboard for ADF.mkv 56MB
  183. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/3.3 Effects, Warning Signs.mkv 56MB
  184. 12 Course Hands-on Azure Data Factory and Security/3.4 Introduction to Streaming Application.mkv 55MB
  185. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/1.2 Types of Bullies.mkv 55MB
  186. 13. Course Getting Started with Vulnerability Analysis and Management/1.1 Introduction.mkv 55MB
  187. 7. Course In the Trenches Security Operations Center/5.3 Find Evil part2.mkv 55MB
  188. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.7. Spoofing Our IP Address and Sending Message with TCP Payload.mp4 55MB
  189. 11. Course Hands-on-Azure Databricks and Security/1.3 Configuring Azure.mkv 55MB
  190. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.12. Getting Passwords from HTTP Websites.mp4 55MB
  191. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/2.5 Financial Fraud.mkv 54MB
  192. 8. Course Common Cybersecurity Attacks and Defense Strategies/1.5 Vishing.mkv 54MB
  193. 12 Course Hands-on Azure Data Factory and Security/1.3 Overview of Azure Databricks.mkv 54MB
  194. 8. Course Common Cybersecurity Attacks and Defense Strategies/1.9 Impersonation.mkv 54MB
  195. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/1.3 loT Devices.mkv 54MB
  196. 13. Course Getting Started with Vulnerability Analysis and Management/4.1 System Hardening Checks.mkv 53MB
  197. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.11. Sniffing FTP Username and Password Part 2.mp4 53MB
  198. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.1. Coding a Simple Port Scanner.mp4 52MB
  199. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.8. Running SynFlooder with Changed Source IP Address.mp4 52MB
  200. 6. Course Wireshark for Ethical Hackers/2.5 Decrypt WiFi Traffic.mkv 52MB
  201. 8. Course Common Cybersecurity Attacks and Defense Strategies/1.4 Smishing.mkv 52MB
  202. 5. Course Information Security for Dummies/2.2 Design and Development.mkv 51MB
  203. 2. Course Black Hat Python Python For Pentesters/Chapter 1 Python Setup and Components/1.4 Python Data Structures.mkv 51MB
  204. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/1.2 Hyper-ConnectedWorld.mkv 51MB
  205. 11. Course Hands-on-Azure Databricks and Security/2.1 Implementing and Configuring Data Factory.mkv 51MB
  206. 13. Course Getting Started with Vulnerability Analysis and Management/2.5 Configuration Review.mkv 51MB
  207. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/4.1 Cybercrame Landscape.mkv 51MB
  208. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 8 Multi-functioning Reverse Shell/8.13.Downloading Files to Target PC.mp4.yandex_disk_download 51MB
  209. 6. Course Wireshark for Ethical Hackers/4.5 Converting PCAP to XML.mkv 51MB
  210. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo (4).mp4 50MB
  211. 13. Course Getting Started with Vulnerability Analysis and Management/2.6 Network Vuln.mkv 50MB
  212. 2. Course Black Hat Python Python For Pentesters/Chapter 7 Databases and Wrapping Up/7.1 Use SQLAlchemy.mkv 49MB
  213. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/2.3 Action Plan.mkv 49MB
  214. 12 Course Hands-on Azure Data Factory and Security/2.5 Running Your First Spark Query.mkv 48MB
  215. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 4 Password Cracking/4.3. Getting Password from MD5 Hash.mp4 48MB
  216. 6. Course Wireshark for Ethical Hackers/3.1 how the Credentials Can Be Stolen.mkv 48MB
  217. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.5. Coding ARP Spoofer.mp4 48MB
  218. 2. Course Black Hat Python Python For Pentesters/Chapter 1 Python Setup and Components/1.1 Setting Up Python.mkv 47MB
  219. 5. Course Information Security for Dummies/4.3 Cryptography in Real Life.mkv 47MB
  220. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 7 Network Analysis/7.2. Analyzing IP Header Part 1.mp4 47MB
  221. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.4. Coding an Advanced Port Scanner Part 1.mp4 47MB
  222. 2. Course Black Hat Python Python For Pentesters/Chapter 4 The Password Cracker Working with Brute-Force Tools/4.1 Password Cracking Concepts.mkv 47MB
  223. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 10 Command and Control Center/10.2. Accepting Connections with a Thread.mp4 47MB
  224. 6. Course Wireshark for Ethical Hackers/3.5 Capture SMTP Password.mkv 47MB
  225. 6. Course Wireshark for Ethical Hackers/3.4 Capture Telnet Password.mkv 46MB
  226. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/6.1.mkv 46MB
  227. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.5. Bruteforcing Any Login Page Part 2.mp4 46MB
  228. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.8. Discovering Subdomains.mp4 46MB
  229. 11. Course Hands-on-Azure Databricks and Security/4.1 Working with Data Set.mkv 46MB
  230. 12 Course Hands-on Azure Data Factory and Security/4.3 Configure and Integrate GIT.mkv 46MB
  231. 12 Course Hands-on Azure Data Factory and Security/4.2 Deploy the Spark Application.mkv 46MB
  232. 8. Course Common Cybersecurity Attacks and Defense Strategies/1.8 Baiting.mkv 45MB
  233. 11. Course Hands-on-Azure Databricks and Security/2.4 Integrating Code Repo with Data Factory.mkv 45MB
  234. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/4.3 Policing and Law.mkv 45MB
  235. 5. Course Information Security for Dummies/6.1 Conclusion.mkv 45MB
  236. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 3 SSH and FTP Attacks/3.4. Coding a SSH Brute-forcer.mp4 45MB
  237. 6. Course Wireshark for Ethical Hackers/1.3 Identifying Open, Closed, and Filtered.mkv 45MB
  238. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 8 Multi-functioning Reverse Shell/8.10. Downloading and Uploading Files to Target PC.mp4.yandex_disk_download 44MB
  239. 12 Course Hands-on Azure Data Factory and Security/4.1 Configuring Security in Databrick Enviroment.mkv 44MB
  240. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 10 Command and Control Center/10.4. Testing Threaded Server with Windows 10 Target.mp4 44MB
  241. 6. Course Wireshark for Ethical Hackers/2.3 Invesrtigating Lost Packets.mkv 44MB
  242. 2. Course Black Hat Python Python For Pentesters/Chapter 4 The Password Cracker Working with Brute-Force Tools/4.3 Brute Force with Threads.mkv 44MB
  243. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 3 SSH and FTP Attacks/3.5. Executing Commands on Target After Brute-forcing SSH.mp4 43MB
  244. 14. Course Computer Forensics Best Practices/4.2 Preservation of Digital Evidence.mkv 43MB
  245. 12 Course Hands-on Azure Data Factory and Security/2.6 Global Init Script.mkv 43MB
  246. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 1 - Introduction and Setup/1.4. Python in Kali Terminal.mp4 43MB
  247. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/3.1.mkv 43MB
  248. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/3.2 Cyberwarfare.mkv 43MB
  249. 13. Course Getting Started with Vulnerability Analysis and Management/4.5 Vuln Assessment using Nessus Windows.mkv 42MB
  250. 2. Course Black Hat Python Python For Pentesters/Chapter 5 Evade Antivirus with Python/5.1 Python Ctypes.mkv 42MB
  251. 7. Course In the Trenches Security Operations Center/0. Synopsis.mkv 42MB
  252. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.9. Coding a Vulnerability Scanner Part 1.mp4 42MB
  253. 6. Course Wireshark for Ethical Hackers/4.2 Analyze SSL Stripping Attack.mkv 41MB
  254. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.12. Coding Run Function.mp4 41MB
  255. 2. Course Black Hat Python Python For Pentesters/Chapter 4 The Password Cracker Working with Brute-Force Tools/4.4 Rainbow Tables.mkv 41MB
  256. 2. Course Black Hat Python Python For Pentesters/Chapter 5 Evade Antivirus with Python/5.3 Dropping the Payload.mkv 41MB
  257. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 8 Multi-functioning Reverse Shell/8.11. Hiding Our Backdoor and Creating Persistence.mp4.yandex_disk_download 41MB
  258. 13. Course Getting Started with Vulnerability Analysis and Management/1.4 Cyber Kill Chain.mkv 41MB
  259. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.5. Coding an Advanced Port Scanner Part 2.mp4 41MB
  260. 13. Course Getting Started with Vulnerability Analysis and Management/4.4 Configuration Review Android.mkv 40MB
  261. 15. Course End-to-End Mobile Security/2.3 official Download Store vs. Inofficial.mkv 40MB
  262. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.6. Finishing and Testing Our Scanner.mp4 40MB
  263. 13. Course Getting Started with Vulnerability Analysis and Management/1.3 Vulnerability Management Lifecycle.mkv 40MB
  264. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.7. Configuring IP Address and Installing Metasploitable.mp4 40MB
  265. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/1.4 Impacts of Cyberbullying.mkv 40MB
  266. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 3 SSH and FTP Attacks/3.3. Testing Our SSH Login Program.mp4 39MB
  267. 15. Course End-to-End Mobile Security/3.1 VPN.mkv 39MB
  268. 6. Course Wireshark for Ethical Hackers/4.11 Detecting Suspicious Traffic.mkv 39MB
  269. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/0. Pre-requisites.mkv 38MB
  270. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.1. Changing MAC Address Manually.mp4 38MB
  271. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 3 SSH and FTP Attacks/3.1.Automating SSH Login Part 1.mp4 38MB
  272. 4. Course Wireless Pentesting with the Raspberry Pi/3. Getting Started with Wireless Hacking.mkv 38MB
  273. 6. Course Wireshark for Ethical Hackers/4.1 Capture Traffic of a Particular Host.mkv 38MB
  274. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/4.2 Victims.mkv 38MB
  275. 15. Course End-to-End Mobile Security/4.5 Buying a Phone and Service.mkv 38MB
  276. 14. Course Computer Forensics Best Practices/2.2 Preparation of Orders.mkv 38MB
  277. 1. Course Hands-on Android Security/Chapter 1 Welcome to the World of Android/4. Storage Structure.mp4 38MB
  278. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 9 Coding a Keylogger/9.3. Features and Tools Vimeo.mp4 38MB
  279. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/4.3 Impacts and What to DO.mkv 37MB
  280. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 3 SSH and FTP Attacks/3.2. Automating SSH Login Part 2.mp4 37MB
  281. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 3 SSH and FTP Attacks/3.6. Anonymous FTP Login Attack.mp4 37MB
  282. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/5.1 Conclusion.mkv 36MB
  283. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.10. Starting Basic and Digest Authentication Bruteforcer.mp4 36MB
  284. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo (3).mp4 36MB
  285. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.7. Finding Hidden Directories Part 2.mp4 36MB
  286. 14. Course Computer Forensics Best Practices/1.1 What is Computer Forensics.mkv 36MB
  287. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/4.2 Causes of Workplace.mkv 36MB
  288. 13. Course Getting Started with Vulnerability Analysis and Management/3.6 SSL Assessment.mkv 36MB
  289. 7. Course In the Trenches Security Operations Center/4.2 Intrusion Prevention Software.mkv 36MB
  290. 12 Course Hands-on Azure Data Factory and Security/3.3 Understand How to Read Data.mkv 35MB
  291. 2. Course Black Hat Python Python For Pentesters/Chapter 1 Python Setup and Components/1.5 Python Networking.mkv 35MB
  292. 2. Course Black Hat Python Python For Pentesters/Chapter 6 Python Forensics Use Python Scripts for Network Investigation/6.2 Parsing Windows Registry.mkv 35MB
  293. Course Metasploit Like a Pro/Chapter 8 Final Thoughts and Wrapping Up/8.2.Final Thoughts.mp4 35MB
  294. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/3.2 Types and Victims.mkv 35MB
  295. 15. Course End-to-End Mobile Security/6.1 Icliud and Google Drive Backup.mkv 35MB
  296. 15. Course End-to-End Mobile Security/4.3 WiFi Spoofing.mkv 35MB
  297. 1. Course Hands-on Android Security/Chapter 3 Attacking Android Platforms/3.1. Attack Surface.mkv 35MB
  298. Course Metasploit Like a Pro/Chapter 5 Firewalls, Antivirus, and External Callbacks/5.5. Using Metasploit Across the Internet.mp4 35MB
  299. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/1.3 Spotting a Cyberbully.mkv 34MB
  300. 13. Course Getting Started with Vulnerability Analysis and Management/4.6 Vuln Assessment using Nessus Linux.mkv 34MB
  301. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 8 Multi-functioning Reverse Shell/8.15. Administrator Privilege Check.mp4 34MB
  302. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.3. Bruteforcing Gmail.mp4 34MB
  303. 2. Course Black Hat Python Python For Pentesters/Chapter 1 Python Setup and Components/1.3 String Formatting in Python.mkv 34MB
  304. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.2. Adding raw_input to Our Port Scanner.mp4 34MB
  305. 2. Course Black Hat Python Python For Pentesters/Chapter 1 Python Setup and Components/1.6 Object-Oriented Programming.mkv 34MB
  306. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 4 Password Cracking/4.1. SHA256, SHA512, MD5.mp4 34MB
  307. 15. Course End-to-End Mobile Security/5.4 Alternative Encrypted Email.mkv 34MB
  308. 11. Course Hands-on-Azure Databricks and Security/3.1 Working with Data Factory.mkv 34MB
  309. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 10 Command and Control Center/10.3.Managing Multiple Sessions.mp4 33MB
  310. 13. Course Getting Started with Vulnerability Analysis and Management/2.4 TCP Session Hijacking.mkv 33MB
  311. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.11. Controlling Threads.mp4 33MB
  312. 15. Course End-to-End Mobile Security/3.2 Other DNS Alternative.mkv 33MB
  313. 8. Course Common Cybersecurity Attacks and Defense Strategies/1.7 Tailgating.mkv 32MB
  314. 8. Course Common Cybersecurity Attacks and Defense Strategies/1.6 Dumpster Diving.mkv 32MB
  315. 2. Course Black Hat Python Python For Pentesters/Chapter 2 Working with Python Network Recon Framework/2.4 Importing and Using Nmap.mkv 32MB
  316. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 9 Coding a Keylogger/9.2. Features and Tools Vimeo.mp4 32MB
  317. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.6. Forwarding Packets and Restoring ARP Tables.mp4 32MB
  318. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/5.2 Malware.mkv 32MB
  319. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo (7).mp4 31MB
  320. 15. Course End-to-End Mobile Security/6.2 MDM with Miradore.mkv 31MB
  321. 2. Course Black Hat Python Python For Pentesters/Chapter 2 Working with Python Network Recon Framework/2.3 Banner Grabbing.mkv 31MB
  322. 3. Course Identity And Access Management/0. Course Roadmap.mkv 31MB
  323. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 8 Multi-functioning Reverse Shell/8.12. Trying to Connect to Server Every 20 Seconds.mp4 31MB
  324. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/5.5 Sexual Abuse.mkv 30MB
  325. 15. Course End-to-End Mobile Security/6.3 Tracking a Lost Device.mkv 30MB
  326. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.10. Coding a Vulnerability Scanner Part 2.mp4 30MB
  327. 15. Course End-to-End Mobile Security/4.4 Faraday Bags.mkv 29MB
  328. 6. Course Wireshark for Ethical Hackers/2.7 Using Wireshark to Detect TCP Delays.mkv 29MB
  329. 15. Course End-to-End Mobile Security/2.2 Application Best Practies.mkv 29MB
  330. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.10. Sniffing FTP Username and Password Part 1.mp4 29MB
  331. 15. Course End-to-End Mobile Security/5.3 Text Call and Scams.mkv 29MB
  332. 2. Course Black Hat Python Python For Pentesters/Chapter 1 Python Setup and Components/0. Synopsis.mkv 29MB
  333. 15. Course End-to-End Mobile Security/5.1 Encrypted Messangeres.mkv 28MB
  334. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/2.4 Online Scams.mkv 28MB
  335. 15. Course End-to-End Mobile Security/3.3 Phone Lock Options.mkv 28MB
  336. 15. Course End-to-End Mobile Security/3.4 Mobile Password Managers.mkv 27MB
  337. 13. Course Getting Started with Vulnerability Analysis and Management/3.3 XSS.mkv 27MB
  338. 11. Course Hands-on-Azure Databricks and Security/3.4 Transformation via Select.mkv 27MB
  339. Course Metasploit Like a Pro/Course Overview/1. Course Overview.mp4 26MB
  340. 2. Course Black Hat Python Python For Pentesters/Chapter 7 Databases and Wrapping Up/7.2 Investigating Firefox profile databases.mkv 26MB
  341. 8. Course Common Cybersecurity Attacks and Defense Strategies/0. Cybersecurity Attack and Defense.mkv 26MB
  342. 11. Course Hands-on-Azure Databricks and Security/3.5 Transformation via Aggregation.mkv 25MB
  343. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/6.2.mkv 25MB
  344. 13. Course Getting Started with Vulnerability Analysis and Management/1.2 Need For Vulnerability Assessment.mkv 25MB
  345. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 8 Multi-functioning Reverse Shell/8.1. Theory Behind Socket Programming.mp4 25MB
  346. 2. Course Black Hat Python Python For Pentesters/Chapter 6 Python Forensics Use Python Scripts for Network Investigation/6.3 Examining Metadata.mkv 24MB
  347. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/5.3 Scams.mkv 24MB
  348. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/2.4 Beat-the-Bully Checklist.mkv 24MB
  349. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/4.1 An Introduction.mkv 24MB
  350. 2. Course Black Hat Python Python For Pentesters/Chapter 6 Python Forensics Use Python Scripts for Network Investigation/6.4 Investigating Application Artifacts.mkv 23MB
  351. 2. Course Black Hat Python Python For Pentesters/Chapter 2 Working with Python Network Recon Framework/2.1 Port Scanning Principles.mkv 23MB
  352. 13. Course Getting Started with Vulnerability Analysis and Management/2.3 Black Box and White Box.mkv 23MB
  353. 1. Course Hands-on Android Security/Chapter 4 Reversing and Creating Android Malware/4.1. Reversing Android Malware.mkv 22MB
  354. 6. Course Wireshark for Ethical Hackers/0. Synopsis.mkv 22MB
  355. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 9 Coding a Keylogger/9.1. Installing Pynput.mp4 22MB
  356. 12 Course Hands-on Azure Data Factory and Security/1.2 Spark Internals and Archtecture.mkv 22MB
  357. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 2 Port and Vulnerability Scanning/2.3. Scanning the First 1,000 Ports.mp4 22MB
  358. 2. Course Black Hat Python Python For Pentesters/Chapter 1 Python Setup and Components/1.1 Pen Testing Overview.mkv 21MB
  359. 2. Course Black Hat Python Python For Pentesters/Chapter 3 The Python Spy Web Recon/3.1 Target Research and Reconnaissance.mkv 21MB
  360. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 5 Sniffers, Flooders, and Spoofers/5.3. Theory Behind ARP Spoofing.mp4 21MB
  361. 1. Course Hands-on Android Security/Chapter 1 Welcome to the World of Android/1. Course Overview.mp4 21MB
  362. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 10 Command and Control Center/10.1. What is a Threaded Server-.mp4 20MB
  363. 1. Course Hands-on Android Security/Chapter 1 Welcome to the World of Android/2. Legal Considerations.mp4 20MB
  364. 9. Course Cybercrime And You Staying Safe in a Hyper-Connected World/5.4 Financial Fraud.mkv 19MB
  365. 2. Course Black Hat Python Python For Pentesters/Chapter 7 Databases and Wrapping Up/7.3. Black Hat Python Course Review.mkv 19MB
  366. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.6. Finding Hidden Directories Part 1.mp4 19MB
  367. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo (6).mp4 18MB
  368. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/3.1 Keeping Teenagers Safe.mkv 17MB
  369. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/2.1 Keeping Children Safe.mkv 17MB
  370. 14. Course Computer Forensics Best Practices/1.1 Computer Forensics.mkv 17MB
  371. 10. Course Cyberbullying and You Beating-the-Bully Guidelines/2.2 Recognizing the Signs.mkv 17MB
  372. 2. Course Black Hat Python Python For Pentesters/Chapter 6 Python Forensics Use Python Scripts for Network Investigation/6.1 Overview of Forensics.mkv 17MB
  373. 4. Course Wireless Pentesting with the Raspberry Pi/0. Course Overview.mkv 16MB
  374. 7. Course In the Trenches Security Operations Center/8.1 Conclusion.mkv 16MB
  375. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo (1).mp4 15MB
  376. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo.mp4 15MB
  377. 15. Course End-to-End Mobile Security/1.1 Introduction.mkv 15MB
  378. 15. Course End-to-End Mobile Security/0. Synopsis.mkv 14MB
  379. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 11 Website Penetration Testing/11.2. Saving Passwords to a File.mp4 13MB
  380. 2. Course Black Hat Python Python For Pentesters/Chapter 4 The Password Cracker Working with Brute-Force Tools/4.6 Cracking ZIP Files.mkv 13MB
  381. 15. Course End-to-End Mobile Security/1.3 Disclaimer.mkv 13MB
  382. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo (5).mp4 11MB
  383. 1. Course Hands-on Android Security/Chapter 5 Wrapping Up/5.1. Next Step.mkv 11MB
  384. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo (8).mp4 10MB
  385. 1. Course Hands-on Android Security/Chapter 5 Wrapping Up/5.2.Course Summary.mkv 10MB
  386. 12 Course Hands-on Azure Data Factory and Security/1.1 Introduction.mkv 6MB
  387. Course Hacking Web Applications via PDFs, Images, and Links/Features and Tools Vimeo (2).mp4 6MB
  388. 6. Course Wireshark for Ethical Hackers/3.2 Extract Images from PCAP File.mkv 4MB
  389. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 8 Multi-functioning Reverse Shell/8.8. Converting Python Backdoor to .exe.mp4.yandex_disk_download 2MB
  390. 12 Course Hands-on Azure Data Factory and Security/2.2 Introduction to Databricks Utility via CLI.mp4 706KB
  391. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 8 Multi-functioning Reverse Shell/8.7. Importing JSON Library to Parse Data.mp4.yandex_disk_download 512KB
  392. Course The Complete Python Hacking Course Beginner to Advanced/Chapter 6 Coding DNS Spoofer/6.2. Printing DNS Queries.mp4.yandex_disk_download 288KB